Show filters
400 Total Results
Displaying 141-150 of 400
Sort by:
Attacker Value
Unknown
CVE-2022-0650
Disclosure Date: March 28, 2023 (last updated February 24, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR940N 3.20.1 Build 200316 Rel.34392n (5553) routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13993.
0
Attacker Value
Unknown
CVE-2023-27078
Disclosure Date: March 23, 2023 (last updated February 24, 2025)
A command injection issue was found in TP-Link MR3020 v.1_150921 that allows a remote attacker to execute arbitrary commands via a crafted request to the tftp endpoint.
0
Attacker Value
Unknown
CVE-2023-1389
Disclosure Date: March 15, 2023 (last updated February 24, 2025)
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
0
Attacker Value
Unknown
CVE-2023-23040
Disclosure Date: February 22, 2023 (last updated February 24, 2025)
TP-Link router TL-WR940N V6 3.19.1 Build 180119 uses a deprecated MD5 algorithm to hash the admin password used for basic authentication.
0
Attacker Value
Unknown
CVE-2023-0936
Disclosure Date: February 21, 2023 (last updated February 24, 2025)
A vulnerability was found in TP-Link Archer C50 V2_160801. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221552.
0
Attacker Value
Unknown
CVE-2022-41505
Disclosure Date: January 23, 2023 (last updated February 24, 2025)
An access control issue on TP-LInk Tapo C200 V1 devices allows physically proximate attackers to obtain root access by connecting to the UART pins, interrupting the boot process, and setting an init=/bin/sh value.
0
Attacker Value
Unknown
CVE-2021-37774
Disclosure Date: January 19, 2023 (last updated October 08, 2023)
An issue was discovered in function httpProcDataSrv in TL-WDR7660 2.0.30 that allows attackers to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2023-22303
Disclosure Date: January 17, 2023 (last updated February 24, 2025)
TP-Link SG105PE firmware prior to 'TL-SG105PE(UN) 1.0_1.0.0 Build 20221208' contains an authentication bypass vulnerability. Under the certain conditions, an attacker may impersonate an administrator of the product. As a result, information may be obtained and/or the product's settings may be altered with the privilege of the administrator.
0
Attacker Value
Unknown
CVE-2022-4498
Disclosure Date: January 11, 2023 (last updated February 24, 2025)
In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.
0
Attacker Value
Unknown
CVE-2022-4499
Disclosure Date: January 11, 2023 (last updated February 24, 2025)
TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.
0