Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tp-link vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-21821
Multiple TP-LINK products allow a network-adjacent authenticated malicious user to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX3000 firmware versions prior to "Archer AX3000(JP)_V1_1.1.2 Build 20231115", Archer AX5400 firmware vers...
Tp-link Archer Ax3000 Firmware
Tp-link Archer Ax5400 Firmware
Tp-link Archer Axe75 Firmware
7.8
CVSSv2
CVE-2015-3035
Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware prior to 150317, C7 (2.0) with firmware prior to 150304, and C8 (1.0) with firmware prior to 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware prior to 150302,...
Tp-link Tl-wr841n \\(9.0\\) Firmware
Tp-link Tl-wr740n \\(5.0\\) Firmware
Tp-link Archer C5 \\(1.2\\) Firmware
Tp-link Tl-wr841n \\(10.0\\) Firmware
Tp-link Tl-wr741nd \\(5.0\\) Firmware
Tp-link Tl-wr741nd \\(5.0\\)
Tp-link Tl-wdr3600 \\(1.0\\) Firmware
Tp-link Archer C7 \\(2.0\\) Firmware
Tp-link Tl-wr841nd \\(10.0\\) Firmware 150104
Tp-link Archer C9 \\(1.0\\) Firmware
Tp-link Tl-wr841nd \\(9.0\\) Firmware
Tp-link Archer C8 \\(1.0\\) Firmware
Tp-link Tl-wdr4300 \\(1.0\\) Firmware
Tp-link Tl-wdr3500 \\(1.0\\) Firmware
NA
CVE-2023-36354
TP-Link TL-WR940N V4, TL-WR841N V8/V10, TL-WR740N V1/V2, TL-WR940N V2/V3, and TL-WR941ND V5/V6 were discovered to contain a buffer overflow in the component /userRpm/AccessCtrlTimeSchedRpm. This vulnerability allows malicious users to cause a Denial of Service (DoS) via a crafted...
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr740n Firmware -
Tp-link Tl-wr941nd Firmware -
NA
CVE-2023-36356
TP-Link TL-WR940N V2/V4/V6, TL-WR841N V8, TL-WR941ND V5, and TL-WR740N V1/V2 were discovered to contain a buffer read out-of-bounds via the component /userRpm/VirtualServerRpm. This vulnerability allows malicious users to cause a Denial of Service (DoS) via a crafted GET request.
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr740n Firmware -
Tp-link Tl-wr941nd Firmware -
NA
CVE-2023-36358
TP-Link TL-WR940N V2/V3/V4, TL-WR941ND V5/V6, TL-WR743ND V1 and TL-WR841N V8 were discovered to contain a buffer overflow in the component /userRpm/AccessCtrlAccessTargetsRpm. This vulnerability allows malicious users to cause a Denial of Service (DoS) via a crafted GET request.
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr941nd Firmware -
Tp-link Tl-wr743nd Firmware -
NA
CVE-2022-46430
TP-Link TL-WR740N V1 and V2 v3.12.4 and previous versions allows authenticated malicious users to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.
Tp-link Tl-wr740n V1 Firmware
Tp-link Tl-wr740n V2 Firmware
Tp-link Tl-wr741nd V1 Firmware
Tp-link Tl-wr741nd V2 Firmware
5
CVSSv2
CVE-2013-2572
A Security Bypass vulnerability exists in TP-LINK IP Cameras TL-SC 3130, TL-SC 3130G, 3171G, 4171G, and 3130 1.6.18P12 due to default hard-coded credentials for the administrative Web interface, which could let a malicious user obtain unauthorized access to CGI files.
Tp-link Tl-sc 3130 Firmware
Tp-link Tl-sc 3130g Firmware
Tp-link Tl-sc 3171g Firmware
Tp-link Tl-sc 4171g Firmware
1 EDB exploit
5
CVSSv2
CVE-2016-1000009
TP-LINK lost control of two domains, www.tplinklogin.net and tplinkextender.net. Please note that these domains are physically printed on many of the devices.
Tp-link Tp-link -
7.8
CVSSv2
CVE-2022-32058
An infinite loop in the function httpRpmPass of TP-Link TL-WR741N/TL-WR742N V1/V2/V3_130415 allows malicious users to cause a Denial of Service (DoS) via a crafted packet.
Tp-link Tl-wr741n Firmware -
Tp-link Tl-wr742n Firmware -
Tp-link Tl-wr741n Firmware V3 130415
Tp-link Tl-wr742n Firmware V3 130415
1 Github repository
NA
CVE-2022-30024
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote malicious user to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU...
Tp-link Tl-wr841 Firmware -
Tp-link Tl-wr841n Firmware 3.16.9
Tp-link Tl-wr841n\\(eu\\) Firmware 160325
Tp-link Tl-wr841n Firmware 150616
Tp-link Tl-wr841n Firmware 150310
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-38298
CVE-2024-20356
CVE-2023-21987
CVE-2024-33217
bypass
CVE-2024-31804
CVE-2024-32660
unauthorized
SSRF
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
8
9
10
NEXT »