Tp-link

Archer C20 Firmware

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Veröffentlicht 05.02.2026 17:22:55
  • Zuletzt bearbeitet 22.04.2026 22:16:28

The response coming from TP-Link Archer MR200 v5.2, C20 v5 and v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-...

  • EPSS 0.01%
  • Veröffentlicht 21.01.2026 17:14:55
  • Zuletzt bearbeitet 28.04.2026 19:36:28

Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers ...

Exploit
  • EPSS 34.6%
  • Veröffentlicht 18.02.2025 15:15:16
  • Zuletzt bearbeitet 12.02.2026 06:16:00

A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to th...

  • EPSS 0.02%
  • Veröffentlicht 06.09.2023 10:15:13
  • Zuletzt bearbeitet 21.11.2024 08:11:23

Improper authentication vulnerability in Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616' allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication.

  • EPSS 0.61%
  • Veröffentlicht 18.07.2023 19:15:09
  • Zuletzt bearbeitet 21.11.2024 08:00:07

TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted da...