Show filters
400 Total Results
Displaying 211-220 of 400
Sort by:
Attacker Value
Unknown

CVE-2021-41653

Disclosure Date: November 13, 2021 (last updated February 23, 2025)
The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field.
Attacker Value
Unknown

CVE-2021-29280

Disclosure Date: August 19, 2021 (last updated February 23, 2025)
In TP-Link Wireless N Router WR840N an ARP poisoning attack can cause buffer overflow
Attacker Value
Unknown

CVE-2021-38543

Disclosure Date: August 11, 2021 (last updated November 28, 2024)
TP-Link UE330 USB splitter devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. We assume that the USB splitter supplies power to some speakers. The power indicator LED of the USB splitter is connected directly to the power line, as a result, the intensity of the USB splitter's power indicator LED is correlative to its power consumption. The sound played by the connected speakers affects the USB splitter's power consumption and as a result is also correlative to the light intensity of the LED. By analyzing measurements obtained from an electro-optical sensor directed at the power indicator LED of the USB splitter, we can recover the sound played by the connected speakers.
Attacker Value
Unknown

CVE-2021-28858

Disclosure Date: June 15, 2021 (last updated February 22, 2025)
TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 does not use SSL by default. Attacker on the local network can monitor traffic and capture the cookie and other sensitive information.
Attacker Value
Unknown

CVE-2021-28857

Disclosure Date: June 15, 2021 (last updated February 22, 2025)
TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 username and password are sent via the cookie.
Attacker Value
Unknown

CVE-2021-31659

Disclosure Date: June 10, 2021 (last updated February 22, 2025)
TP-Link TL-SG2005, TL-SG2008, etc. 1.0.0 Build 20180529 Rel.40524 is vulnerable to Cross Site Request Forgery (CSRF). All configuration information is placed in the URL, without any additional token authentication information. A malicious link opened by the switch administrator may cause the password of the switch to be modified and the configuration file to be tampered with.
Attacker Value
Unknown

CVE-2021-31658

Disclosure Date: June 10, 2021 (last updated February 22, 2025)
TP-Link TL-SG2005, TL-SG2008, etc. 1.0.0 Build 20180529 Rel.40524 is affected by an Array index error. The interface that provides the "device description" function only judges the length of the received data, and does not filter special characters. This vulnerability will cause the application to crash, and all device configuration information will be erased.
Attacker Value
Unknown

CVE-2020-17891

Disclosure Date: May 14, 2021 (last updated February 22, 2025)
TP-Link Archer C1200 firmware version 1.13 Build 2018/01/24 rel.52299 EU has a XSS vulnerability allowing a remote attacker to execute arbitrary code.
Attacker Value
Unknown

CVE-2021-27246

Disclosure Date: April 14, 2021 (last updated February 22, 2025)
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 AC1750 1.0.15 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of MAC addresses by the tdpServer endpoint. A crafted TCP message can write stack pointers to the stack. An attacker can leverage this vulnerability to execute code in the context of the root user. Was ZDI-CAN-12306.
Attacker Value
Unknown

CVE-2021-26827

Disclosure Date: April 14, 2021 (last updated February 22, 2025)
Buffer Overflow in TP-Link WR2041 v1 firmware for the TL-WR2041+ router allows remote attackers to cause a Denial-of-Service (DoS) by sending an HTTP request with a very long "ssid" parameter to the "/userRpm/popupSiteSurveyRpm.html" webpage, which crashes the router.