Show filters
400 Total Results
Displaying 231-240 of 400
Sort by:
Attacker Value
Unknown
CVE-2020-28877
Disclosure Date: November 20, 2020 (last updated February 22, 2025)
Buffer overflow in in the copy_msg_element function for the devDiscoverHandle server in the TP-Link WR and WDR series, including WDR7400, WDR7500, WDR7660, WDR7800, WDR8400, WDR8500, WDR8600, WDR8620, WDR8640, WDR8660, WR880N, WR886N, WR890N, WR890N, WR882N, and WR708N.
0
Attacker Value
Unknown
CVE-2020-28005
Disclosure Date: November 18, 2020 (last updated February 22, 2025)
httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4_201023
0
Attacker Value
Unknown
CVE-2020-24297
Disclosure Date: November 18, 2020 (last updated February 22, 2025)
httpd on TP-Link TL-WPA4220 devices (versions 2 through 4) allows remote authenticated users to execute arbitrary OS commands by sending crafted POST requests to the endpoint /admin/powerline. Fixed version: TL-WPA4220(EU)_V4_201023
0
Attacker Value
Unknown
CVE-2020-28347
Disclosure Date: November 08, 2020 (last updated February 22, 2025)
tdpServer on TP-Link Archer A7 AC1750 devices before 201029 allows remote attackers to execute arbitrary code via the slave_mac parameter. NOTE: this issue exists because of an incomplete fix for CVE-2020-10882 in which shell quotes are mishandled.
0
Attacker Value
Unknown
CVE-2020-5795
Disclosure Date: November 06, 2020 (last updated February 22, 2025)
UNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200721 allows an authenticated admin user, with physical access and network access, to execute arbitrary code after plugging a crafted USB drive into the router.
0
Attacker Value
Unknown
CVE-2020-24363
Disclosure Date: August 31, 2020 (last updated February 22, 2025)
TP-Link TL-WA855RE V5 20200415-rel37464 devices allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password.
0
Attacker Value
Unknown
CVE-2020-15056
Disclosure Date: August 07, 2020 (last updated February 21, 2025)
TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name.
0
Attacker Value
Unknown
CVE-2020-15055
Disclosure Date: August 07, 2020 (last updated February 21, 2025)
TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter.
0
Attacker Value
Unknown
CVE-2020-15057
Disclosure Date: August 07, 2020 (last updated February 21, 2025)
TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to denial-of-service the device via long input values.
0
Attacker Value
Unknown
CVE-2020-15054
Disclosure Date: August 07, 2020 (last updated February 21, 2025)
TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic.
0