CVE-2023-27359
- EPSS 1.87%
- Veröffentlicht 03.05.2024 02:15:13
- Zuletzt bearbeitet 06.08.2025 14:21:22
TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability. This vulnerability allows remote attackers to gain access to LAN-side services on affected installations of TP-Link Archer AX21 routers. Authentication is not required to exploit thi...
CVE-2023-27346
- EPSS 1.6%
- Veröffentlicht 03.05.2024 02:15:12
- Zuletzt bearbeitet 06.08.2025 14:23:12
TP-Link AX1800 Firmware Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link AX1800 routers. Authentication is not...
CVE-2023-27332
- EPSS 0.92%
- Veröffentlicht 03.05.2024 02:15:10
- Zuletzt bearbeitet 06.08.2025 14:24:19
TP-Link Archer AX21 tdpServer Logging Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer AX21 routers. Authentica...
CVE-2023-27333
- EPSS 0.6%
- Veröffentlicht 03.05.2024 02:15:10
- Zuletzt bearbeitet 06.08.2025 14:24:05
TP-Link Archer AX21 tmpServer Command 0x422 Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Archer AX21 routers. Auth...
CVE-2023-31710
- EPSS 0.12%
- Veröffentlicht 01.08.2023 14:15:10
- Zuletzt bearbeitet 21.11.2024 08:02:11
TP-Link Archer AX21(US)_V3_1.1.4 Build 20230219 and AX21(US)_V3.6_1.1.4 Build 20230219 are vulnerable to Buffer Overflow.
CVE-2023-1389
- EPSS 93.82%
- Veröffentlicht 15.03.2023 23:15:09
- Zuletzt bearbeitet 19.03.2025 20:57:29
TP-Link Archer AX21 (AX1800) firmware versions before 1.1.4 Build 20230219 contained a command injection vulnerability in the country form of the /cgi-bin/luci;stok=/locale endpoint on the web management interface. Specifically, the country parameter...