Filtered by vendor Tp-link Subscriptions
Total 364 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2024-10523 1 Tp-link 2 Tapo H100, Tapo H100 Firmware 2024-11-08 4.6 Medium
This vulnerability exists in TP-Link IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device.
CVE-2023-47617 1 Tp-link 2 Er7206, Er7206 Firmware 2024-11-07 7.2 High
A post authentication command injection vulnerability exists when configuring the web group member of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.
CVE-2024-21833 1 Tp-link 10 Archer Ax3000, Archer Ax3000 Firmware, Archer Ax5400 and 7 more 2024-11-06 8.8 High
Multiple TP-LINK products allow a network-adjacent unauthenticated attacker with access to the product to execute arbitrary OS commands. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.
CVE-2024-22733 1 Tp-link 3 Mr200, Mr200 Firmware, Tl-mr200 V4 Firmware 2024-11-05 3.5 Low
TP Link MR200 V4 Firmware version 210201 was discovered to contain a null-pointer-dereference in the web administration panel on /cgi/login via the sign, Action or LoginStatus query parameters which could lead to a denial of service by a local or remote unauthenticated attacker.
CVE-2024-37661 1 Tp-link 1 Tl-7dr5130 2024-11-04 6.3 Medium
TP-LINK TL-7DR5130 v1.0.23 is vulnerable to forged ICMP redirect message attacks. An attacker in the same WLAN as the victim can hijack the traffic between the victim and any remote server by sending out forged ICMP redirect messages.
CVE-2023-30383 1 Tp-link 7 Archer C2, Archer C20, Archer C20 Firmware and 4 more 2024-10-28 7.5 High
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
CVE-2023-46522 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2024-10-25 8.8 High
TP-LINK device TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin and TL-WDR7660 2.0.30 were discovered to contain a stack overflow via the function deviceInfoRegister.
CVE-2024-42815 1 Tp-link 1 Re365 2024-10-24 9.8 Critical
In the TP-Link RE365 V1_180213, there is a buffer overflow vulnerability due to the lack of length verification for the USER_AGENT field in /usr/bin/httpd. Attackers who successfully exploit this vulnerability can cause the remote target device to crash or execute arbitrary commands.
CVE-2023-31710 1 Tp-link 2 Archer Ax21, Archer Ax21 Firmware 2024-10-21 9.8 Critical
TP-Link Archer AX21(US)_V3_1.1.4 Build 20230219 and AX21(US)_V3.6_1.1.4 Build 20230219 are vulnerable to Buffer Overflow.
CVE-2024-48714 1 Tp-link 1 Tl-wdr7660 Firmware 2024-10-16 6.5 Medium
In TP-Link TL-WDR7660 v1.0, the guestRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
CVE-2024-48713 1 Tp-link 1 Tl-wdr7660 Firmware 2024-10-16 6.5 Medium
In TP-Link TL-WDR7660 1.0, the wacWhitelistJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
CVE-2024-48712 1 Tp-link 1 Tl-wdr7660 Firmware 2024-10-16 6.5 Medium
In TP-Link TL-WDR7660 1.0, the rtRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
CVE-2024-48710 1 Tp-link 1 Tl-wdr7660 Firmware 2024-10-16 6.5 Medium
In TP-Link TL-WDR7660 1.0, the wlanTimerRuleJsonToBin function handles the parameter string name without checking it, which can lead to stack overflow vulnerabilities.
CVE-2024-46325 1 Tp-link 1 Wr740n Firmware 2024-10-08 5.5 Medium
TP-Link WR740N V6 has a stack overflow vulnerability via the ssid parameter in /userRpm/popupSiteSurveyRpm.htm url.
CVE-2024-46486 1 Tp-link 1 Tl-wdr5620 Firmware 2024-10-07 8 High
TP-LINK TL-WDR5620 v2.3 was discovered to contain a remote code execution (RCE) vulnerability via the httpProcDataSrv function.
CVE-2023-39748 2 Tp-link, Tp Link 3 Tl-wr1041n V2, Tl-wr1041n V2 Firmware, Tl-wr1041n 2024-10-07 7.5 High
An issue in the component /userRpm/NetworkCfgRpm of TP-Link TL-WR1041N V2 allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
CVE-2023-39745 1 Tp-link 9 Tl-wr841n, Tl-wr841n V8, Tl-wr841n V8 Firmware and 6 more 2024-10-07 7.5 High
TP-Link TL-WR940N V2, TP-Link TL-WR941ND V5 and TP-Link TL-WR841N V8 were discovered to contain a buffer overflow via the component /userRpm/AccessCtrlAccessRulesRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request.
CVE-2023-39747 1 Tp-link 9 Tl-wr841n V8, Tl-wr841n V8 Firmware, Tl-wr940n and 6 more 2024-10-07 9.8 Critical
TP-Link WR841N V8, TP-Link TL-WR940N V2, and TL-WR941ND V5 were discovered to contain a buffer overflow via the radiusSecret parameter at /userRpm/WlanSecurityRpm.
CVE-2023-39751 1 Tp-link 3 Tl-wr941nd, Tl-wr941nd V6, Tl-wr941nd V6 Firmware 2024-10-07 9.8 Critical
TP-Link TL-WR941ND V6 were discovered to contain a buffer overflow via the pSize parameter at /userRpm/PingIframeRpm.
CVE-2024-46313 1 Tp-link 1 Tl-wr941nd 2024-10-04 8 High
TP-Link WR941ND V6 has a stack overflow vulnerability in the ssid parameter in /userRpm/popupSiteSurveyRpm.htm.