CVE-2023-36489
- EPSS 0.14%
- Veröffentlicht 06.09.2023 10:15:13
- Zuletzt bearbeitet 21.11.2024 08:09:49
Multiple TP-LINK products allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior...
CVE-2021-4144
- EPSS 1.77%
- Veröffentlicht 23.12.2021 07:15:06
- Zuletzt bearbeitet 21.11.2024 06:36:59
TP-Link wifi router TL-WR802N V4(JP), with firmware version prior to 211202, is vulnerable to OS command injection.
CVE-2021-29302
- EPSS 10.97%
- Veröffentlicht 12.04.2021 19:15:14
- Zuletzt bearbeitet 21.11.2024 06:00:56
TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which...
CVE-2021-3275
- EPSS 1.22%
- Veröffentlicht 26.03.2021 13:15:11
- Zuletzt bearbeitet 21.11.2024 06:21:11
Unauthenticated stored cross-site scripting (XSS) exists in multiple TP-Link products including WIFI Routers (Wireless AC routers), Access Points, ADSL + DSL Gateways and Routers, which affects TD-W9977v1, TL-WA801NDv5, TL-WA801Nv6, TL-WA802Nv5, and ...