Vulnerabilities (CVE)

Filtered by vendor Tp-link Subscribe
Total 348 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2019-12104 1 Tp-link 2 M7350, M7350 Firmware 2019-08-19 9.0 HIGH 8.8 HIGH
The web-based configuration interface of the TP-Link M7350 V3 with firmware before 190531 is affected by several post-authentication command injection vulnerabilities.
CVE-2019-12195 1 Tp-link 2 Tl-wr840n, Tl-wr840n Firmware 2019-05-29 3.5 LOW 4.8 MEDIUM
TP-Link TL-WR840N v5 00000005 devices allow XSS via the network name. The attacker must log into the router by breaking the password and going to the admin login page by THC-HYDRA to get the network name. With an XSS payload, the network name changed automatically and the internet connection was disconnected. All the users become disconnected from the internet.
CVE-2016-10719 1 Tp-link 2 Archer Cr700, Archer Cr700 Firmware 2019-05-16 4.3 MEDIUM 6.1 MEDIUM
TP-Link Archer CR-700 1.0.6 devices have an XSS vulnerability that can be introduced into the admin account through a DHCP request, allowing the attacker to steal the cookie information, which contains the base64 encoded username and password.
CVE-2018-15840 1 Tp-link 2 Tl-wr840n, Tl-wr840n Firmware 2019-04-02 5.0 MEDIUM 7.5 HIGH
TP-Link TL-WR840N devices allow remote attackers to cause a denial of service (networking outage) via fragmented packets, as demonstrated by an "nmap -f" command.
CVE-2018-13134 1 Tp-link 2 Archer C1200, Archer C1200 Firmware 2019-03-28 4.3 MEDIUM 6.1 MEDIUM
TP-Link Archer C1200 1.13 Build 2018/01/24 rel.52299 EU devices have XSS via the PATH_INFO to the /webpages/data URI.
CVE-2018-18428 1 Tp-link 2 Tl-sc3130, Tl-sc3130 Firmware 2019-01-23 5.0 MEDIUM 7.5 HIGH
TP-Link TL-SC3130 1.6.18P12_121101 devices allow unauthenticated RTSP stream access, as demonstrated by a /jpg/image.jpg URI.
CVE-2018-20372 1 Tp-link 2 Td-w8961nd, Td-w8961nd Firmware 2019-01-11 3.5 LOW 5.4 MEDIUM
TP-Link TD-W8961ND devices allow XSS via the hostname of a DHCP client.
CVE-2018-19537 1 Tp-link 2 Archer C5, Archer C5 Firmware 2018-12-28 9.0 HIGH 7.2 HIGH
TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin may be used in some cases.
CVE-2018-19528 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2018-12-19 10.0 HIGH 9.8 CRITICAL
TP-Link TL-WR886N 7.0 1.1.0 devices allow remote attackers to cause a denial of service (Tlb Load Exception) via crafted DNS packets to port 53/udp.
CVE-2018-15700 1 Tp-link 2 Tl-wrn841n, Tl-wrn841n Firmware 2018-11-27 6.1 MEDIUM 6.5 MEDIUM
The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Referer field.
CVE-2018-15701 1 Tp-link 2 Tl-wrn841n, Tl-wrn841n Firmware 2018-11-27 3.3 LOW 6.5 MEDIUM
The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Cookie field.
CVE-2018-15702 1 Tp-link 2 Tl-wrn841n, Tl-wrn841n Firmware 2018-11-27 6.8 MEDIUM 8.8 HIGH
The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to CSRF due to insufficient validation of the referer field.
CVE-2018-15172 1 Tp-link 2 Tl-wr840n, Tl-wr840n Firmware 2018-10-15 5.0 MEDIUM 7.5 HIGH
TP-Link WR840N devices have a buffer overflow via a long Authorization HTTP header.
CVE-2014-4728 1 Tp-link 2 Tl-wdr4300, Tl-wdr4300 Firmware 2018-10-09 5.0 MEDIUM N/A
The web server in the TP-LINK N750 Wireless Dual Band Gigabit Router (TL-WDR4300) with firmware before 140916 allows remote attackers to cause a denial of service (crash) via a long header in a GET request.
CVE-2014-4727 1 Tp-link 2 Tl-wdr4300, Tl-wdr4300 Firmware 2018-10-09 4.3 MEDIUM N/A
Cross-site scripting (XSS) vulnerability in the DHCP clients page in the TP-LINK N750 Wireless Dual Band Gigabit Router (TL-WDR4300) with firmware before 140916 allows remote attackers to inject arbitrary web script or HTML via the hostname in a DHCP request.
CVE-2018-14336 1 Tp-link 1 Wr840n 2018-09-18 5.0 MEDIUM 7.5 HIGH
TP-Link WR840N devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses.
CVE-2018-12575 1 Tp-link 2 Tl-wr841n, Tl-wr841n Firmware 2018-09-04 7.5 HIGH 9.8 CRITICAL
On TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 171019 Rel.55346n devices, all actions in the web interface are affected by bypass of authentication via an HTTP request.
CVE-2018-12574 1 Tp-link 2 Tl-wr841n, Tl-wr841n Firmware 2018-09-04 6.8 MEDIUM 8.8 HIGH
CSRF exists for all actions in the web interface on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices.
CVE-2018-12694 1 Tp-link 2 Tl-wa850re, Tl-wa850re Firmware 2018-08-24 7.8 HIGH 7.5 HIGH
TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote attackers to cause a denial of service (reboot) via data/reboot.json.
CVE-2018-11714 1 Tp-link 4 Tl-wr840n, Tl-wr840n Firmware, Tl-wr841n and 1 more 2018-07-31 10.0 HIGH 9.8 CRITICAL
An issue was discovered on TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n and TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Build 170622 Rel.64334n devices. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a header of "Referer: http://192.168.0.1/mainFrame.htm" then no authentication is required for any action.