Show filters
400 Total Results
Displaying 141-150 of 400
Sort by:
Attacker Value
Unknown

CVE-2022-0650

Disclosure Date: March 28, 2023 (last updated October 08, 2023)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR940N 3.20.1 Build 200316 Rel.34392n (5553) routers. Authentication is required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13993.
Attacker Value
Unknown

CVE-2023-27078

Disclosure Date: March 23, 2023 (last updated October 08, 2023)
A command injection issue was found in TP-Link MR3020 v.1_150921 that allows a remote attacker to execute arbitrary commands via a crafted request to the tftp endpoint.
Attacker Value
Unknown

CVE-2023-1389

Disclosure Date: March 15, 2023 (last updated October 08, 2023)
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter of the write operation was not sanitized before being used in a call to popen(), allowing an unauthenticated attacker to inject commands, which would be run as root, with a simple POST request.
Attacker Value
Unknown

CVE-2023-23040

Disclosure Date: February 22, 2023 (last updated October 08, 2023)
TP-Link router TL-WR940N V6 3.19.1 Build 180119 uses a deprecated MD5 algorithm to hash the admin password used for basic authentication.
Attacker Value
Unknown

CVE-2023-0936

Disclosure Date: February 21, 2023 (last updated October 08, 2023)
A vulnerability was found in TP-Link Archer C50 V2_160801. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221552.
Attacker Value
Unknown

CVE-2022-41505

Disclosure Date: January 23, 2023 (last updated February 24, 2025)
An access control issue on TP-LInk Tapo C200 V1 devices allows physically proximate attackers to obtain root access by connecting to the UART pins, interrupting the boot process, and setting an init=/bin/sh value.
Attacker Value
Unknown

CVE-2021-37774

Disclosure Date: January 19, 2023 (last updated October 08, 2023)
An issue was discovered in function httpProcDataSrv in TL-WDR7660 2.0.30 that allows attackers to execute arbitrary code.
Attacker Value
Unknown

CVE-2023-22303

Disclosure Date: January 17, 2023 (last updated February 24, 2025)
TP-Link SG105PE firmware prior to 'TL-SG105PE(UN) 1.0_1.0.0 Build 20221208' contains an authentication bypass vulnerability. Under the certain conditions, an attacker may impersonate an administrator of the product. As a result, information may be obtained and/or the product's settings may be altered with the privilege of the administrator.
Attacker Value
Unknown

CVE-2022-4498

Disclosure Date: January 11, 2023 (last updated February 24, 2025)
In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow. This can result in either a DoS (by crashing the httpd process) or an arbitrary code execution.
Attacker Value
Unknown

CVE-2022-4499

Disclosure Date: January 11, 2023 (last updated February 24, 2025)
TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack. By measuring the response time of the httpd process, an attacker could guess each byte of the username and password.