Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tp-link vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-38907
An issue in TPLink Smart Bulb Tapo series L530 prior to 1.2.4, L510E prior to 1.1.0, L630 prior to 1.0.4, P100 prior to 1.5.0, and Tapo Application 2.8.14 allows a remote malicious user to replay old messages encrypted with a still valid session key.
Tp-link Tapo L530e Firmware 1.0.0
Tp-link Tapo 2.8.14
NA
CVE-2023-43135
There is an unauthorized access vulnerability in TP-LINK ER5120G 4.0 2.0.0 Build 210817 Rel.80868n, which allows malicious users to obtain sensitive information of the device without authentication, obtain user tokens, and ultimately log in to the device backend management.
Tp-link Tl-er5120g Firmware 2.0.0
NA
CVE-2023-43137
TPLINK TL-ER5120G 4.0 2.0.0 Build 210817 Rel.80868n has a command injection vulnerability, when an attacker adds ACL rules after authentication, and the rule name parameter has injection points.
Tp-link Tl-er5120g Firmware 2.0.0
NA
CVE-2023-43138
TPLINK TL-ER5120G 4.0 2.0.0 Build 210817 Rel.80868n has a command injection vulnerability, when an attacker adds NAPT rules after authentication, and the rule name has an injection point.
Tp-link Tl-er5120g Firmware 2.0.0
NA
CVE-2023-39224
Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated malicious user to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product i...
Tp-link Archer C7 Firmware
NA
CVE-2023-38563
Archer C1200 firmware versions prior to 'Archer C1200(JP)_V2_230508' and Archer C9 firmware versions prior to 'Archer C9(JP)_V3_230508' allow a network-adjacent unauthenticated malicious user to execute arbitrary OS commands.
Tp-link Archer C1200 Firmware
Tp-link Archer C9 Firmware
NA
CVE-2023-38568
Archer A10 firmware versions prior to 'Archer A10(JP)_V2_230504' allows a network-adjacent unauthenticated malicious user to execute arbitrary OS commands.
Tp-link Archer A10 Firmware
NA
CVE-2023-32619
Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505' and Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506' use hard-coded credentials to login to the affected device, which may allow a network-adjacent unauthenticated malicious user ...
Tp-link Archer C55 Firmware
Tp-link Archer C50 V3 Firmware
NA
CVE-2023-36489
Multiple TP-LINK products allow a network-adjacent unauthenticated malicious user to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior to 'TL-W...
Tp-link Tl-wr902ac Firmware
Tp-link Tl-wr802n Firmware
Tp-link Tl-wr841n Firmware
NA
CVE-2023-40531
Archer AX6000 firmware versions prior to 'Archer AX6000(JP)_V1_1.3.0 Build 20221208' allows a network-adjacent authenticated malicious user to execute arbitrary OS commands.
Tp-link Archer Ax6000 Firmware
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
NULL pointer dereference
CVE-2023-52689
CVE-2024-23803
client side
CVE-2023-52696
information disclosure
CVE-2024-35843
CVE-2024-27130
CVE-2023-52697
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
2
3
4
5
6
7
8
9
10
NEXT »