Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tp-link tl-wr841n - vulnerabilities and exploits
(subscribe to this query)
6.8
CVSSv2
CVE-2018-12574
CSRF exists for all actions in the web interface on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices.
Tp-link Tl-wr841n Firmware 0.9.1 4.16
6.5
CVSSv2
CVE-2018-12577
The Ping and Traceroute features on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices allow authenticated blind Command Injection.
Tp-link Tl-wr841n Firmware 0.9.1 4.16
7.5
CVSSv2
CVE-2017-9466
The executable httpd on the TP-Link WR841N V8 router before TL-WR841N(UN)_V8_170210 contained a design flaw in the use of DES for block encryption. This resulted in incorrect access control, which allowed malicious users to gain read-write access to system settings through the pr...
Tp-link Wr841n V8 Firmware
9
CVSSv2
CVE-2020-35576
A Command Injection issue in the traceroute feature on TP-Link TL-WR841N V13 (JP) with firmware versions before 201216 allows authenticated users to execute arbitrary code as root via shell metacharacters, a different vulnerability than CVE-2018-12577.
Tp-link Tl-wr841n Firmware
NA
CVE-2022-42202
TP-Link TL-WR841N 8.0 4.17.16 Build 120201 Rel.54750n is vulnerable to Cross Site Scripting (XSS).
Tp-link Tl-wr841n Firmware 4.17.16 Build 120201 Rel.54750n
7.5
CVSSv2
CVE-2018-12575
On TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 171019 Rel.55346n devices, all actions in the web interface are affected by bypass of authentication via an HTTP request.
Tp-link Tl-wr841n Firmware 0.9.1 4.16
9
CVSSv2
CVE-2020-8423
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10 (firmware version 3.16.9) devices allows an authenticated remote malicious user to execute arbitrary code via a GET request to the page for the configuration of the Wi-Fi network.
Tp-link Tl-wr841n Firmware 3.16.9
1 Github repository
7.5
CVSSv2
CVE-2022-0162
The vulnerability exists in TP-Link TL-WR841N V11 3.16.9 Build 160325 Rel.62500n wireless router due to transmission of authentication information in cleartextbase64 format. Successful exploitation of this vulnerability could allow a remote malicious user to intercept credentials...
Tp-link Tl-wr841n Firmware 3.16.9
9.3
CVSSv2
CVE-2019-17147
This vulnerability allows remote malicious users to execute arbitrary code on affected installations of TP-LINK TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the web service, which listens on TCP port 80 by defaul...
Tp-link Tl-wr841n Firmware 0.9.1 4.16
1 Github repository
NA
CVE-2023-50224
TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent malicious users to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to explo...
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
man-in-the-middle
CVE-2024-34558
CVE-2024-32674
CVE-2024-34351
XPath injection
CVE-2023-45866
CVE-2024-25528
CVE-2024-25517
path traversal
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »