Vulnerabilities (CVE)

Filtered by vendor Tp-link Subscribe
Total 348 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-24297 1 Tp-link 2 Tl-wpa4220, Tl-wpa4220 Firmware 2020-12-01 9.0 HIGH 8.8 HIGH
httpd on TP-Link TL-WPA4220 devices (versions 2 through 4) allows remote authenticated users to execute arbitrary OS commands by sending crafted POST requests to the endpoint /admin/powerline. Fixed version: TL-WPA4220(EU)_V4_201023
CVE-2020-5795 1 Tp-link 2 Archer A7, Archer A7 Firmware 2020-11-19 7.2 HIGH 6.2 MEDIUM
UNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200721 allows an authenticated admin user, with physical access and network access, to execute arbitrary code after plugging a crafted USB drive into the router.
CVE-2020-24363 1 Tp-link 2 Tl-wa855re, Tl-wa855re Firmware 2020-09-08 8.3 HIGH 8.8 HIGH
TP-Link TL-WA855RE V5 20200415-rel37464 devices allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password.
CVE-2017-13772 1 Tp-link 2 Wr940n, Wr940n Firmware 2020-08-31 9.0 HIGH 8.8 HIGH
Multiple stack-based buffer overflows in TP-Link WR940N WiFi routers with hardware version 4 allow remote authenticated users to execute arbitrary code via the (1) ping_addr parameter to PingIframeRpm.htm or (2) dnsserver2 parameter to WanStaticIpV6CfgRpm.htm.
CVE-2018-17016 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for reboot_timer name.
CVE-2018-17008 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_host_2g power.
CVE-2019-12103 1 Tp-link 2 M7350, M7350 Firmware 2020-08-24 10.0 HIGH 9.8 CRITICAL
The web-based configuration interface of the TP-Link M7350 V3 with firmware before 190531 is affected by a pre-authentication command injection vulnerability.
CVE-2019-6487 1 Tp-link 10 Tl-wdr3500, Tl-wdr3500 Firmware, Tl-wdr3600 and 7 more 2020-08-24 6.5 MEDIUM 8.8 HIGH
TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field.
CVE-2018-17011 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for hosts_info para sun.
CVE-2018-17005 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for firewall dmz enable.
CVE-2017-8217 1 Tp-link 4 C2, C20i, C20i Firmware and 1 more 2020-08-24 5.0 MEDIUM 5.3 MEDIUM
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n have too permissive iptables rules, e.g., SNMP is not blocked on any interface.
CVE-2019-6989 1 Tp-link 4 Tl-wr940n, Tl-wr940n Firmware, Tl-wr941nd and 1 more 2020-08-24 9.0 HIGH 8.8 HIGH
TP-Link TL-WR940N is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the ipAddrDispose function. By sending specially crafted ICMP echo request packets, a remote authenticated attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges.
CVE-2018-18489 1 Tp-link 2 Wr840n, Wr840n Firmware 2020-08-24 6.8 MEDIUM 4.9 MEDIUM
The ping feature in the Diagnostic functionality on TP-LINK WR840N v2 Firmware 3.16.9 Build 150701 Rel.51516n devices allows remote attackers to cause a denial of service (HTTP service termination) by modifying the packet size to be higher than the UI limit of 1472.
CVE-2018-17017 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for dhcpd udhcpd enable.
CVE-2018-17014 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for ip_mac_bind name.
CVE-2018-17004 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wlan_access name.
CVE-2018-17015 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for ddns phddns username.
CVE-2018-17012 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for hosts_info set_block_flag up_limit.
CVE-2018-17010 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2020-08-24 4.0 MEDIUM 6.5 MEDIUM
An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_host_2g bandwidth.
CVE-2018-12693 1 Tp-link 2 Tl-wa850re, Tl-wa850re Firmware 2020-08-24 6.8 MEDIUM 6.5 MEDIUM
Stack-based buffer overflow in TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote authenticated users to cause a denial of service (outage) via a long type parameter to /data/syslog.filter.json.