Show filters
5 Total Results
Displaying 1-5 of 5
Sort by:
Attacker Value
Unknown

CVE-2021-44827

Disclosure Date: March 04, 2022 (last updated February 23, 2025)
There is remote authenticated OS command injection on TP-Link Archer C20i 0.9.1 3.2 v003a.0 Build 170221 Rel.55462n devices vie the X_TP_ExternalIPv6Address HTTP parameter, allowing a remote attacker to run arbitrary commands on the router with root privileges.
Attacker Value
Unknown

CVE-2017-8217

Disclosure Date: April 25, 2017 (last updated November 26, 2024)
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n have too permissive iptables rules, e.g., SNMP is not blocked on any interface.
0
Attacker Value
Unknown

CVE-2017-8220

Disclosure Date: April 25, 2017 (last updated November 26, 2024)
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow remote code execution with a single HTTP request by placing shell commands in a "host=" line within HTTP POST data.
0
Attacker Value
Unknown

CVE-2017-8219

Disclosure Date: April 25, 2017 (last updated November 26, 2024)
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI.
0
Attacker Value
Unknown

CVE-2017-8218

Disclosure Date: April 25, 2017 (last updated November 26, 2024)
vsftpd on TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n has a backdoor admin account with the 1234 password, a backdoor guest account with the guest password, and a backdoor test account with the test password.
0