Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tp-link tl-wr841n firmware 0.9.1 4.16 vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2019-17147
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of TP-LINK TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 80 by defaul...
Tp-link Tl-wr841n Firmware 0.9.1 4.16
1 Github repository
4.3
CVSSv3
CVE-2018-12576
TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices allow clickjacking.
Tp-link Tl-wr841n Firmware 0.9.1 4.16
8.8
CVSSv3
CVE-2018-12574
CSRF exists for all actions in the web interface on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices.
Tp-link Tl-wr841n Firmware 0.9.1 4.16
9.8
CVSSv3
CVE-2018-12575
On TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 171019 Rel.55346n devices, all actions in the web interface are affected by bypass of authentication via an HTTP request.
Tp-link Tl-wr841n Firmware 0.9.1 4.16
8.8
CVSSv3
CVE-2018-12577
The Ping and Traceroute features on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices allow authenticated blind Command Injection.
Tp-link Tl-wr841n Firmware 0.9.1 4.16
9.8
CVSSv3
CVE-2018-11714
An issue exists on TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n and TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Build 170622 Rel.64334n devices. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a ...
Tp-link Tl-wr840n Firmware 0.9.1 3.16
Tp-link Tl-wr841n Firmware 0.9.1 4.16
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
TCP
CVE-2024-4577
CVE-2024-2695
CVE-2024-31870
injection
CVE-2024-3813
arbitrary code
CVE-2024-27801
CVE-2024-30120
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started