On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-7098 On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T13:00:51.997Z

Reserved: 2020-06-22T00:00:00

Link: CVE-2020-14965

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-23T14:15:12.823

Modified: 2024-11-21T05:04:31.830

Link: CVE-2020-14965

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses