Tp-link

Archer C50

4 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.01%
  • Published 05.12.2024 13:15:09
  • Last modified 05.12.2024 13:15:09

This vulnerability exists in the TP-Link Archer C50 due to improper signature verification mechanism in the firmware upgrade process at its web interface. An attacker with administrative privileges within the router’s Wi-Fi range could exploit this v...

  • EPSS 0.03%
  • Published 05.12.2024 13:15:09
  • Last modified 05.12.2024 13:15:09

This vulnerability exists in the TP-Link Archer C50 due to presence of terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the UART shell on the vulnerable device. Succ...

Exploit
  • EPSS 0.03%
  • Published 21.02.2023 10:15:11
  • Last modified 21.11.2024 07:38:08

A vulnerability was found in TP-Link Archer C50 V2_160801. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation leads to denial of service. The attack can o...

Exploit
  • EPSS 30.96%
  • Published 25.03.2020 15:15:11
  • Last modified 21.11.2024 05:40:30

TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.