Lucene search

K

Tp-link Security Vulnerabilities

cve
cve

CVE-2017-15636

TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the new-time variable in the webfilter.lua file.

7.2CVSS

7.4AI Score

0.001EPSS

2018-01-11 04:29 PM
29
cve
cve

CVE-2017-15637

TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the pptphellointerval variable in the pptp_server.lua file.

7.2CVSS

7.4AI Score

0.001EPSS

2018-01-11 04:29 PM
23
cve
cve

CVE-2017-16957

TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the iface field of an admin/diagnostic command to cgi-bin/luci, related to the zone_get_effect_devices function in /usr/lib/lua/luci/controller/admin/diagnostic...

8.8CVSS

8.8AI Score

0.002EPSS

2017-11-27 10:29 AM
34
cve
cve

CVE-2017-16958

TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the t_bindif field of an admin/bridge command to cgi-bin/luci, related to the get_device_byif function in /usr/lib/lua/luci/controller/admin/bridge.lua in uhttp...

8.8CVSS

8.8AI Score

0.004EPSS

2017-11-27 10:29 AM
27
cve
cve

CVE-2017-16959

The locale feature in cgi-bin/luci on TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allows remote authenticated users to test for the existence of arbitrary files by making an operation=write;locale=%0d request, and then making an operation=read request with a crafted Accept-Language HTTP header,...

6.5CVSS

6.3AI Score

0.048EPSS

2017-11-27 10:29 AM
23
cve
cve

CVE-2017-16960

TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the t_bindif field of an admin/interface command to cgi-bin/luci, related to the get_device_byif function in /usr/lib/lua/luci/controller/admin/interface.lua in...

8.8CVSS

8.8AI Score

0.001EPSS

2017-11-27 10:29 AM
26
cve
cve

CVE-2017-17745

Cross-site scripting (XSS) vulnerability in system_name_set.cgi in TP-Link TL-SG108E 1.0.0 allows authenticated remote attackers to submit arbitrary java script via the 'sysName' parameter.

5.4CVSS

5.3AI Score

0.001EPSS

2017-12-20 08:29 PM
23
cve
cve

CVE-2017-17746

Weak access control methods on the TP-Link TL-SG108E 1.0.0 allow any user on a NAT network with an authenticated administrator to access the device without entering user credentials. The authentication record is stored on the device; thus if an administrator authenticates from a NAT network, the au...

6.8CVSS

6.6AI Score

0.0004EPSS

2017-12-20 08:29 PM
21
cve
cve

CVE-2017-17747

Weak access controls in the Device Logout functionality on the TP-Link TL-SG108E v1.0.0 allow remote attackers to call the logout functionality, triggering a denial of service condition.

6.5CVSS

6.4AI Score

0.002EPSS

2017-12-20 08:29 PM
24
cve
cve

CVE-2017-17757

TP-Link TL-WVR and TL-WAR devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the interface field of an admin/wportal command to cgi-bin/luci, related to the get_device_byif function in /usr/lib/lua/luci/controller/admin/wportal.lua in uhttpd.

8.8CVSS

8.8AI Score

0.002EPSS

2017-12-19 07:29 AM
19
cve
cve

CVE-2017-17758

TP-Link TL-WVR and TL-WAR devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the interface field of an admin/dhcps command to cgi-bin/luci, related to the zone_get_iface_bydev function in /usr/lib/lua/luci/controller/admin/dhcps.lua in uhttpd.

8.8CVSS

8.8AI Score

0.002EPSS

2017-12-19 07:29 AM
18
cve
cve

CVE-2017-8074

On the TP-Link TL-SG108E 1.0, a remote attacker could retrieve credentials from "SEND data" log lines where passwords are encoded in hexadecimal. This affects the 1.1.2 Build 20141017 Rel.50749 firmware.

9.8CVSS

9.2AI Score

0.015EPSS

2017-04-23 04:59 PM
18
cve
cve

CVE-2017-8075

On the TP-Link TL-SG108E 1.0, a remote attacker could retrieve credentials from "Switch Info" log lines where passwords are in cleartext. This affects the 1.1.2 Build 20141017 Rel.50749 firmware.

9.8CVSS

9.2AI Score

0.004EPSS

2017-04-23 04:59 PM
19
cve
cve

CVE-2017-8076

On the TP-Link TL-SG108E 1.0, admin network communications are RC4 encoded, even though RC4 is deprecated. This affects the 1.1.2 Build 20141017 Rel.50749 firmware.

9.8CVSS

9.3AI Score

0.003EPSS

2022-10-03 04:23 PM
20
cve
cve

CVE-2017-8077

On the TP-Link TL-SG108E 1.0, there is a hard-coded ciphering key (a long string beginning with Ei2HNryt). This affects the 1.1.2 Build 20141017 Rel.50749 firmware.

7.5CVSS

7.5AI Score

0.001EPSS

2022-10-03 04:23 PM
24
cve
cve

CVE-2017-8078

On the TP-Link TL-SG108E 1.0, the upgrade process can be requested remotely without authentication (httpupg.cgi with a parameter called cmd). This affects the 1.1.2 Build 20141017 Rel.50749 firmware.

5.3CVSS

5.4AI Score

0.001EPSS

2017-04-23 04:59 PM
18
cve
cve

CVE-2017-8217

TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n have too permissive iptables rules, e.g., SNMP is not blocked on any interface.

5.3CVSS

5.5AI Score

0.001EPSS

2022-10-03 04:23 PM
29
cve
cve

CVE-2017-8218

vsftpd on TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n has a backdoor admin account with the 1234 password, a backdoor guest account with the guest password, and a backdoor test account with the test password.

9.8CVSS

9.4AI Score

0.006EPSS

2022-10-03 04:23 PM
38
cve
cve

CVE-2017-8219

TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow DoSing the HTTP server via a crafted Cookie header to the /cgi/ansi URI.

6.5CVSS

6.4AI Score

0.001EPSS

2022-10-03 04:23 PM
22
cve
cve

CVE-2017-8220

TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow remote code execution with a single HTTP request by placing shell commands in a "host=" line within HTTP POST data.

9.9CVSS

9.8AI Score

0.002EPSS

2022-10-03 04:23 PM
20
cve
cve

CVE-2017-9466

The executable httpd on the TP-Link WR841N V8 router before TL-WR841N(UN)_V8_170210 contained a design flaw in the use of DES for block encryption. This resulted in incorrect access control, which allowed attackers to gain read-write access to system settings through the protected router configurat...

9.8CVSS

9.4AI Score

0.003EPSS

2017-06-26 07:29 AM
23
cve
cve

CVE-2018-10164

Stored Cross-site scripting (XSS) vulnerability in the TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows allows authenticated attackers to inject arbitrary web script or HTML via the implementation of portalPictureUpload functionality. This is fixed in version 2.6.1_W...

5.4CVSS

5.6AI Score

0.001EPSS

2018-05-03 06:29 PM
22
cve
cve

CVE-2018-10165

Stored Cross-site scripting (XSS) vulnerability in the TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows allows authenticated attackers to inject arbitrary web script or HTML via the userName parameter in the local user creation functionality. This is fixed in version...

5.4CVSS

5.6AI Score

0.001EPSS

2018-05-03 06:29 PM
23
cve
cve

CVE-2018-10166

The web management interface in the TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows does not have Anti-CSRF tokens in any forms. This would allow an attacker to submit authenticated requests when an authenticated user browses an attack-controlled domain. This is fix...

8.8CVSS

8.4AI Score

0.003EPSS

2018-05-03 06:29 PM
26
cve
cve

CVE-2018-10167

The web application backup file in the TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows is encrypted with a hard-coded cryptographic key, so anyone who knows that key and the algorithm can decrypt it. A low-privilege user could decrypt and modify the backup file in o...

7.5CVSS

7.5AI Score

0.001EPSS

2018-05-03 06:29 PM
26
cve
cve

CVE-2018-10168

TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows do not control privileges for usage of the Web API, allowing a low-privilege user to make any request as an Administrator. This is fixed in version 2.6.1_Windows.

8.8CVSS

8.5AI Score

0.001EPSS

2018-05-03 06:29 PM
22
cve
cve

CVE-2018-11481

TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-*, and TL-IPC40A-4 devices allow authenticated remote code execution via crafted JSON data because /usr/lib/lua/luci/torchlight/validator.lua does not block various punctuation characters.

8.8CVSS

8.9AI Score

0.005EPSS

2018-05-30 09:29 PM
30
cve
cve

CVE-2018-11482

/usr/lib/lua/luci/websys.lua on TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-*, and TL-IPC40A-4 devices has a hardcoded zMiVw8Kw0oxKXL0 password.

9.8CVSS

9.4AI Score

0.001EPSS

2018-05-30 09:29 PM
19
cve
cve

CVE-2018-11714

An issue was discovered on TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n and TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Build 170622 Rel.64334n devices. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a header of "...

9.8CVSS

9.3AI Score

0.415EPSS

2022-10-03 04:21 PM
25
cve
cve

CVE-2018-12574

CSRF exists for all actions in the web interface on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices.

8.8CVSS

8.6AI Score

0.009EPSS

2018-07-02 04:29 PM
28
cve
cve

CVE-2018-12575

On TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 171019 Rel.55346n devices, all actions in the web interface are affected by bypass of authentication via an HTTP request.

9.8CVSS

9.5AI Score

0.021EPSS

2018-07-02 04:29 PM
42
cve
cve

CVE-2018-12576

TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices allow clickjacking.

4.3CVSS

4.8AI Score

0.001EPSS

2018-07-02 04:29 PM
29
cve
cve

CVE-2018-12577

The Ping and Traceroute features on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices allow authenticated blind Command Injection.

8.8CVSS

8.7AI Score

0.002EPSS

2018-07-02 04:29 PM
30
cve
cve

CVE-2018-12692

TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the wps_setup_pin parameter to /data/wps.setup.json.

8.8CVSS

8.7AI Score

0.003EPSS

2022-10-03 04:22 PM
24
cve
cve

CVE-2018-12693

Stack-based buffer overflow in TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote authenticated users to cause a denial of service (outage) via a long type parameter to /data/syslog.filter.json.

6.5CVSS

6.3AI Score

0.002EPSS

2022-10-03 04:22 PM
20
cve
cve

CVE-2018-12694

TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote attackers to cause a denial of service (reboot) via data/reboot.json.

7.5CVSS

7.4AI Score

0.002EPSS

2022-10-03 04:22 PM
20
cve
cve

CVE-2018-13134

TP-Link Archer C1200 1.13 Build 2018/01/24 rel.52299 EU devices have XSS via the PATH_INFO to the /webpages/data URI.

6.1CVSS

6AI Score

0.001EPSS

2018-07-04 08:29 AM
30
cve
cve

CVE-2018-14336

TP-Link WR840N devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses.

7.5CVSS

7.4AI Score

0.079EPSS

2018-07-19 08:29 PM
40
cve
cve

CVE-2018-15172

TP-Link WR840N devices have a buffer overflow via a long Authorization HTTP header.

7.5CVSS

7.8AI Score

0.01EPSS

2018-08-15 05:29 PM
38
cve
cve

CVE-2018-15700

The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Referer field.

6.5CVSS

6.4AI Score

0.001EPSS

2018-10-01 08:29 PM
26
cve
cve

CVE-2018-15701

The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Cookie field.

6.5CVSS

6.4AI Score

0.001EPSS

2018-10-01 08:29 PM
17
cve
cve

CVE-2018-15702

The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to CSRF due to insufficient validation of the referer field.

8.8CVSS

8.6AI Score

0.001EPSS

2018-10-01 08:29 PM
26
cve
cve

CVE-2018-15840

TP-Link TL-WR840N devices allow remote attackers to cause a denial of service (networking outage) via fragmented packets, as demonstrated by an "nmap -f" command.

7.5CVSS

7.5AI Score

0.002EPSS

2019-03-29 06:29 PM
20
cve
cve

CVE-2018-16119

Stack-based buffer overflow in the httpd server of TP-Link WR1043nd (Firmware Version 3) allows remote attackers to execute arbitrary code via a malicious MediaServer request to /userRpm/MediaServerFoldersCfgRpm.htm.

7.2CVSS

7.5AI Score

0.008EPSS

2019-06-20 04:15 PM
76
cve
cve

CVE-2018-17004

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wlan_access name.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
18
cve
cve

CVE-2018-17005

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for firewall dmz enable.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
18
cve
cve

CVE-2018-17006

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for firewall lan_manage mac2.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
17
cve
cve

CVE-2018-17007

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_wds_2g ssid.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
20
cve
cve

CVE-2018-17008

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_host_2g power.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
19
cve
cve

CVE-2018-17009

An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for wireless wlan_host_2g isolate.

6.5CVSS

6.5AI Score

0.001EPSS

2022-10-03 04:22 PM
23
Total number of security vulnerabilities370