CVE-2026-3227
- EPSS 0.3%
- Veröffentlicht 13.03.2026 21:38:31
- Zuletzt bearbeitet 07.04.2026 01:07:52
A command injection vulnerability was identified in TP-Link TL-WR802N v4, TL-WR841N v14, and TL-WR840N v6 due to improper neutralization of special elements used in an OS command. In the router configuration import function allows an authenticated a...
CVE-2023-36489
- EPSS 0.14%
- Veröffentlicht 06.09.2023 10:15:13
- Zuletzt bearbeitet 21.11.2024 08:09:49
Multiple TP-LINK products allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior...
CVE-2021-4144
- EPSS 1.72%
- Veröffentlicht 23.12.2021 07:15:06
- Zuletzt bearbeitet 21.11.2024 06:36:59
TP-Link wifi router TL-WR802N V4(JP), with firmware version prior to 211202, is vulnerable to OS command injection.
CVE-2021-29302
- EPSS 10.09%
- Veröffentlicht 12.04.2021 19:15:14
- Zuletzt bearbeitet 21.11.2024 06:00:56
TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which...
CVE-2021-3275
- EPSS 1.22%
- Veröffentlicht 26.03.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:21:11
Unauthenticated stored cross-site scripting (XSS) exists in multiple TP-Link products including WIFI Routers (Wireless AC routers), Access Points, ADSL + DSL Gateways and Routers, which affects TD-W9977v1, TL-WA801NDv5, TL-WA801Nv6, TL-WA802Nv5, and ...