Lucene search

K

4 matches found

CVE
CVE
added 2021/01/26 6:15 p.m.105 views

CVE-2020-35576

A Command Injection issue in the traceroute feature on TP-Link TL-WR841N V13 (JP) with firmware versions prior to 201216 allows authenticated users to execute arbitrary code as root via shell metacharacters, a different vulnerability than CVE-2018-12577.

9CVSS8.9AI score0.69832EPSS
Web
CVE
CVE
added 2024/05/03 3:15 a.m.54 views

CVE-2023-39471

TP-Link TL-WR841N ated_tp Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exi...

8.8CVSS8.1AI score0.00787EPSS
CVE
CVE
added 2023/09/06 10:15 a.m.42 views

CVE-2023-36489

Multiple TP-LINK products allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior to 'TL-WR841N(JP)_V14_230506', and TL-WR902AC fi...

8.8CVSS8.9AI score0.0014EPSS
CVE
CVE
added 2025/08/29 6:15 p.m.26 views

CVE-2025-9377

The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both products have reached the status of EOL (end-of-lif...

8.6CVSS6.7AI score0.20007EPSS
In wild