Vulnerabilities (CVE)

Filtered by vendor Tp-link Subscribe
Total 351 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2021-35003 1 Tp-link 2 Archer C90, Archer C90 Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
This vulnerability allows remote attackers to execute arbitrary code on affected installations of TP-Link Archer C90 1.0.6 Build 20200114 rel.73164(5553) routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of DNS responses. A crafted DNS message can trigger an overflow of a fixed-length, stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-14655.
CVE-2021-31659 1 Tp-link 4 Tl-sg2005, Tl-sg2005 Firmware, Tl-sg2008 and 1 more 2024-11-21 6.8 MEDIUM 8.8 HIGH
TP-Link TL-SG2005, TL-SG2008, etc. 1.0.0 Build 20180529 Rel.40524 is vulnerable to Cross Site Request Forgery (CSRF). All configuration information is placed in the URL, without any additional token authentication information. A malicious link opened by the switch administrator may cause the password of the switch to be modified and the configuration file to be tampered with.
CVE-2021-31658 1 Tp-link 4 Tl-sg2005, Tl-sg2005 Firmware, Tl-sg2008 and 1 more 2024-11-21 5.8 MEDIUM 8.1 HIGH
TP-Link TL-SG2005, TL-SG2008, etc. 1.0.0 Build 20180529 Rel.40524 is affected by an Array index error. The interface that provides the "device description" function only judges the length of the received data, and does not filter special characters. This vulnerability will cause the application to crash, and all device configuration information will be erased.
CVE-2021-29302 1 Tp-link 2 Tl-wr802n, Tl-wr802n Firmware 2024-11-21 9.3 HIGH 8.1 HIGH
TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.
CVE-2021-29280 1 Tp-link 2 Tl-wr840n, Tl-wr840n Firmware 2024-11-21 4.3 MEDIUM 6.4 MEDIUM
In TP-Link Wireless N Router WR840N an ARP poisoning attack can cause buffer overflow
CVE-2021-28858 1 Tp-link 2 Tl-wpa4220, Tl-wpa4220 Firmware 2024-11-21 2.1 LOW 5.5 MEDIUM
TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 does not use SSL by default. Attacker on the local network can monitor traffic and capture the cookie and other sensitive information.
CVE-2021-28857 1 Tp-link 2 Tl-wpa4220, Tl-wpa4220 Firmware 2024-11-21 5.0 MEDIUM 7.5 HIGH
TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 username and password are sent via the cookie.
CVE-2021-27246 1 Tp-link 2 Ac1750, Ac1750 Firmware 2024-11-21 7.9 HIGH 8.0 HIGH
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer A7 AC1750 1.0.15 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of MAC addresses by the tdpServer endpoint. A crafted TCP message can write stack pointers to the stack. An attacker can leverage this vulnerability to execute code in the context of the root user. Was ZDI-CAN-12306.
CVE-2021-27245 1 Tp-link 2 Archer A7, Archer A7 Firmware 2024-11-21 9.3 HIGH 8.1 HIGH
This vulnerability allows a firewall bypass on affected installations of TP-Link Archer A7 prior to Archer C7(US)_V5_210125 and Archer A7(US)_V5_200220 AC1750 routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the handling of IPv6 connections. The issue results from the lack of proper filtering of IPv6 SSH connections. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of root. Was ZDI-CAN-12309.
CVE-2021-27210 1 Tp-link 2 Archer C5v, Archer C5v Firmware 2024-11-21 4.0 MEDIUM 6.5 MEDIUM
TP-Link Archer C5v 1.7_181221 devices allows remote attackers to retrieve cleartext credentials via [USER_CFG#0,0,0,0,0,0#0,0,0,0,0,0]0,0 to the /cgi?1&5 URI.
CVE-2021-27209 1 Tp-link 2 Archer C5v, Archer C5v Firmware 2024-11-21 3.6 LOW 7.1 HIGH
In the management interface on TP-Link Archer C5v 1.7_181221 devices, credentials are sent in a base64 format over cleartext HTTP.
CVE-2021-26827 1 Tp-link 2 Tl-wr2041\+, Tl-wr2041\+ Firmware 2024-11-21 7.8 HIGH 7.5 HIGH
Buffer Overflow in TP-Link WR2041 v1 firmware for the TL-WR2041+ router allows remote attackers to cause a Denial-of-Service (DoS) by sending an HTTP request with a very long "ssid" parameter to the "/userRpm/popupSiteSurveyRpm.html" webpage, which crashes the router.
CVE-2020-9375 1 Tp-link 2 Archer C5, Archer C50 2024-11-21 7.8 HIGH 7.5 HIGH
TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.
CVE-2020-9374 1 Tp-link 2 Tl-wr849n, Tl-wr849n Firmware 2024-11-21 7.5 HIGH 9.8 CRITICAL
On TP-Link TL-WR849N 0.9.1 4.16 devices, a remote command execution vulnerability in the diagnostics area can be exploited when an attacker sends specific shell metacharacters to the panel's traceroute feature.
CVE-2020-8423 1 Tp-link 2 Tl-wr841n, Tl-wr841n Firmware 2024-11-21 9.0 HIGH 7.2 HIGH
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10 (firmware version 3.16.9) devices allows an authenticated remote attacker to execute arbitrary code via a GET request to the page for the configuration of the Wi-Fi network.
CVE-2020-5797 1 Tp-link 2 Archer C9, Archer C9 Firmware 2024-11-21 3.6 LOW 6.1 MEDIUM
UNIX Symbolic Link (Symlink) Following in TP-Link Archer C9(US)_V1_180125 firmware allows an unauthenticated actor, with physical access and network access, to read sensitive files and write to a limited set of files after plugging a crafted USB drive into the router.
CVE-2020-5795 1 Tp-link 2 Archer A7, Archer A7 Firmware 2024-11-21 7.2 HIGH 6.2 MEDIUM
UNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200721 allows an authenticated admin user, with physical access and network access, to execute arbitrary code after plugging a crafted USB drive into the router.
CVE-2020-36178 1 Tp-link 2 Tl-wr840n, Tl-wr840n Firmware 2024-11-21 10.0 HIGH 9.8 CRITICAL
oal_ipt_addBridgeIsolationRules on TP-Link TL-WR840N 6_EU_0.9.1_4.16 devices allows OS command injection because a raw string entered from the web interface (an IP address field) is used directly for a call to the system library function (for iptables). NOTE: oal_ipt_addBridgeIsolationRules is not the only function that calls util_execSystem.
CVE-2020-35576 1 Tp-link 2 Tl-wr841n, Tl-wr841n Firmware 2024-11-21 9.0 HIGH 8.8 HIGH
A Command Injection issue in the traceroute feature on TP-Link TL-WR841N V13 (JP) with firmware versions prior to 201216 allows authenticated users to execute arbitrary code as root via shell metacharacters, a different vulnerability than CVE-2018-12577.
CVE-2020-35575 1 Tp-link 54 Archer C5, Archer C5 Firmware, Archer C7 and 51 more 2024-11-21 7.5 HIGH 9.8 CRITICAL
A password-disclosure issue in the web interface on certain TP-Link devices allows a remote attacker to get full administrative access to the web panel. This affects WA901ND devices before 3.16.9(201211) beta, and Archer C5, Archer C7, MR3420, MR6400, WA701ND, WA801ND, WDR3500, WDR3600, WE843N, WR1043ND, WR1045ND, WR740N, WR741ND, WR749N, WR802N, WR840N, WR841HP, WR841N, WR842N, WR842ND, WR845N, WR940N, WR941HP, WR945N, WR949N, and WRD4300 devices.