Show filters
400 Total Results
Displaying 191-200 of 400
Sort by:
Attacker Value
Unknown
CVE-2021-44032
Disclosure Date: March 10, 2022 (last updated February 23, 2025)
TP-Link Omada SDN Software Controller before 5.0.15 does not check if the authentication method specified in a connection request is allowed. An attacker can bypass the captive portal authentication process by using the downgraded "no authentication" method, and access the protected network. For example, the attacker can simply set window.authType=0 in client-side JavaScript.
0
Attacker Value
Unknown
CVE-2021-44827
Disclosure Date: March 04, 2022 (last updated February 23, 2025)
There is remote authenticated OS command injection on TP-Link Archer C20i 0.9.1 3.2 v003a.0 Build 170221 Rel.55462n devices vie the X_TP_ExternalIPv6Address HTTP parameter, allowing a remote attacker to run arbitrary commands on the router with root privileges.
0
Attacker Value
Unknown
CVE-2022-25062
Disclosure Date: February 25, 2022 (last updated February 23, 2025)
TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain an integer overflow via the function dm_checkString. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted HTTP request.
0
Attacker Value
Unknown
CVE-2022-25061
Disclosure Date: February 25, 2022 (last updated February 23, 2025)
TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a command injection vulnerability via the component oal_setIp6DefaultRoute.
0
Attacker Value
Unknown
CVE-2022-25060
Disclosure Date: February 25, 2022 (last updated February 23, 2025)
TP-LINK TL-WR840N(ES)_V6.20_180709 was discovered to contain a command injection vulnerability via the component oal_startPing.
0
Attacker Value
Unknown
CVE-2022-25074
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
TP-Link TL-WR902AC(US)_V3_191209 routers were discovered to contain a stack overflow in the function DM_ Fillobjbystr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2022-25073
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
TL-WR841Nv14_US_0.9.1_4.18 routers were discovered to contain a stack overflow in the function dm_fillObjByStr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2022-25072
Disclosure Date: February 24, 2022 (last updated February 23, 2025)
TP-Link Archer A54 Archer A54(US)_V1_210111 routers were discovered to contain a stack overflow in the function DM_ Fillobjbystr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.
0
Attacker Value
Unknown
CVE-2022-24355
Disclosure Date: February 18, 2022 (last updated February 23, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link TL-WR940N 3.20.1 Build 200316 Rel.34392n (5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the parsing of file name extensions. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-13910.
0
Attacker Value
Unknown
CVE-2022-24354
Disclosure Date: February 18, 2022 (last updated February 23, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AC1750 prior to 1.1.4 Build 20211022 rel.59103(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the NetUSB.ko module. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-15835.
0