- EPSS 0.1%
- Published 06.09.2023 10:15:14
- Last modified 21.11.2024 08:19:17
Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to 'Archer AX50(JP)_V1_230529', Archer A10 firmware versions pr...
CVE-2023-34832
- EPSS 0.13%
- Published 16.06.2023 18:15:09
- Last modified 21.11.2024 08:07:36
TP-Link Archer AX10(EU)_V1.2_230220 was discovered to contain a buffer overflow via the function FUN_131e8 - 0x132B4.
CVE-2021-41451
- EPSS 6.83%
- Published 17.12.2021 15:15:07
- Last modified 21.11.2024 06:26:16
A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated attacker to send a specially crafted HTTP request and receive a misconfigured HTTP/0.9 response, potentially leading i...
CVE-2021-40288
- EPSS 1.96%
- Published 07.12.2021 20:15:07
- Last modified 21.11.2024 06:23:49
A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoof...