Show filters
169 Total Results
Displaying 81-90 of 169
Sort by:
Attacker Value
Unknown

CVE-2022-26948

Disclosure Date: March 30, 2022 (last updated February 23, 2025)
The Archer RSS feed integration for Archer 6.x through 6.9 SP1 (6.9.1.0) is affected by an insecure credential storage vulnerability. A malicious attacker may obtain access to credential information to use it in further attacks.
Attacker Value
Unknown

CVE-2022-26947

Disclosure Date: March 30, 2022 (last updated February 23, 2025)
Archer 6.x through 6.9 SP3 (6.9.3.0) contains a reflected XSS vulnerability. A remote authenticated malicious Archer user could potentially exploit this vulnerability by tricking a victim application user into supplying malicious HTML or JavaScript code to the vulnerable web application; the malicious code is then reflected back to the victim and gets executed by the web browser in the context of the vulnerable web application.
Attacker Value
Unknown

CVE-2021-41594

Disclosure Date: March 30, 2022 (last updated October 07, 2023)
In RSA Archer 6.9.SP1 P3, if some application functions are precluded by the Administrator, this can be bypassed by intercepting the API request at the /api/V2/internal/TaskPermissions/CheckTaskAccess endpoint. If the parameters of this request are replaced with empty fields, the attacker achieves access to the precluded functions.
Attacker Value
Unknown

CVE-2021-44827

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
There is remote authenticated OS command injection on TP-Link Archer C20i 0.9.1 3.2 v003a.0 Build 170221 Rel.55462n devices vie the X_TP_ExternalIPv6Address HTTP parameter, allowing a remote attacker to run arbitrary commands on the router with root privileges.
Attacker Value
Unknown

CVE-2022-25072

Disclosure Date: February 24, 2022 (last updated February 23, 2025)
TP-Link Archer A54 Archer A54(US)_V1_210111 routers were discovered to contain a stack overflow in the function DM_ Fillobjbystr(). This vulnerability allows unauthenticated attackers to execute arbitrary code.
Attacker Value
Unknown

CVE-2021-35003

Disclosure Date: January 21, 2022 (last updated February 23, 2025)
This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer C90 1.0.6 Build 20200114 rel.73164(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14655.
Attacker Value
Unknown

CVE-2021-41451

Disclosure Date: December 17, 2021 (last updated February 23, 2025)
A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated attacker to send a specially crafted HTTP request and receive a misconfigured HTTP/0.9 response, potentially leading into a cache poisoning attack.
Attacker Value
Unknown

CVE-2021-41450

Disclosure Date: December 08, 2021 (last updated February 23, 2025)
An HTTP request smuggling attack in TP-Link AX10v1 before v1_211117 allows a remote unauthenticated attacker to DoS the web application via sending a specific HTTP packet.
Attacker Value
Unknown

CVE-2021-40288

Disclosure Date: December 07, 2021 (last updated February 23, 2025)
A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames
Attacker Value
Unknown

CVE-2021-29252

Disclosure Date: May 26, 2021 (last updated February 22, 2025)
RSA Archer before 6.9 SP1 P1 (6.9.1.1) contains a stored XSS vulnerability. A remote authenticated malicious Archer user with access to modify link name fields could potentially exploit this vulnerability to execute code in a victim's browser.