Show filters
400 Total Results
Displaying 281-290 of 400
Sort by:
Attacker Value
Unknown
CVE-2019-13613
Disclosure Date: July 17, 2019 (last updated November 27, 2024)
CMD_FTEST_CONFIG in the TP-Link Device Debug protocol in TP-Link Wireless Router Archer Router version 1.0.0 Build 20180502 rel.45702 (EU) and earlier is prone to a stack-based buffer overflow, which allows a remote attacker to achieve code execution or denial of service by sending a crafted payload to the listening server.
0
Attacker Value
Unknown
CVE-2018-16119
Disclosure Date: June 20, 2019 (last updated November 27, 2024)
Stack-based buffer overflow in the httpd server of TP-Link WR1043nd (Firmware Version 3) allows remote attackers to execute arbitrary code via a malicious MediaServer request to /userRpm/MediaServerFoldersCfgRpm.htm.
0
Attacker Value
Unknown
CVE-2019-6972
Disclosure Date: June 19, 2019 (last updated November 27, 2024)
An issue was discovered on TP-Link TL-WR1043ND V2 devices. The credentials can be easily decoded and cracked by brute-force, WordList, or Rainbow Table attacks. Specifically, credentials in the "Authorization" cookie are encoded with URL encoding and base64, leading to easy decoding. Also, the username is cleartext, and the password is hashed with the MD5 algorithm (after decoding of the URL encoded string with base64).
0
Attacker Value
Unknown
CVE-2019-6971
Disclosure Date: June 19, 2019 (last updated November 27, 2024)
An issue was discovered on TP-Link TL-WR1043ND V2 devices. An attacker can send a cookie in an HTTP authentication packet to the router management web interface, and fully control the router without knowledge of the credentials.
0
Attacker Value
Unknown
CVE-2019-6989
Disclosure Date: June 06, 2019 (last updated November 27, 2024)
TP-Link TL-WR940N is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the ipAddrDispose function. By sending specially crafted ICMP echo request packets, a remote authenticated attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges.
0
Attacker Value
Unknown
CVE-2019-12195
Disclosure Date: May 24, 2019 (last updated November 27, 2024)
TP-Link TL-WR840N v5 00000005 devices allow XSS via the network name. The attacker must log into the router by breaking the password and going to the admin login page by THC-HYDRA to get the network name. With an XSS payload, the network name changed automatically and the internet connection was disconnected. All the users become disconnected from the internet.
0
Attacker Value
Unknown
CVE-2016-10719
Disclosure Date: May 15, 2019 (last updated November 27, 2024)
TP-Link Archer CR-700 1.0.6 devices have an XSS vulnerability that can be introduced into the admin account through a DHCP request, allowing the attacker to steal the cookie information, which contains the base64 encoded username and password.
0
Attacker Value
Unknown
CVE-2018-18489
Disclosure Date: April 16, 2019 (last updated November 27, 2024)
The ping feature in the Diagnostic functionality on TP-LINK WR840N v2 Firmware 3.16.9 Build 150701 Rel.51516n devices allows remote attackers to cause a denial of service (HTTP service termination) by modifying the packet size to be higher than the UI limit of 1472.
0
Attacker Value
Unknown
CVE-2018-15840
Disclosure Date: March 29, 2019 (last updated November 27, 2024)
TP-Link TL-WR840N devices allow remote attackers to cause a denial of service (networking outage) via fragmented packets, as demonstrated by an "nmap -f" command.
0
Attacker Value
Unknown
CVE-2019-6487
Disclosure Date: January 18, 2019 (last updated November 27, 2024)
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
0