CVE-2021-28857
- EPSS 0.26%
- Veröffentlicht 15.06.2021 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:00:20
TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 username and password are sent via the cookie.
CVE-2021-28858
- EPSS 0.03%
- Veröffentlicht 15.06.2021 22:15:08
- Zuletzt bearbeitet 21.11.2024 06:00:20
TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 does not use SSL by default. Attacker on the local network can monitor traffic and capture the cookie and other sensitive information.
- EPSS 1.53%
- Veröffentlicht 18.11.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:14:34
httpd on TP-Link TL-WPA4220 devices (versions 2 through 4) allows remote authenticated users to execute arbitrary OS commands by sending crafted POST requests to the endpoint /admin/powerline. Fixed version: TL-WPA4220(EU)_V4_201023
CVE-2020-28005
- EPSS 0.92%
- Veröffentlicht 18.11.2020 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:22:11
httpd on TP-Link TL-WPA4220 devices (hardware versions 2 through 4) allows remote authenticated users to trigger a buffer overflow (causing a denial of service) by sending a POST request to the /admin/syslog endpoint. Fixed version: TL-WPA4220(EU)_V4...