Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
link vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2022-32058
An infinite loop in the function httpRpmPass of TP-Link TL-WR741N/TL-WR742N V1/V2/V3_130415 allows malicious users to cause a Denial of Service (DoS) via a crafted packet.
Tp-link Tl-wr741n Firmware -
Tp-link Tl-wr742n Firmware -
Tp-link Tl-wr741n Firmware V3 130415
Tp-link Tl-wr742n Firmware V3 130415
1 Github repository
NA
CVE-2022-30024
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote malicious user to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU...
Tp-link Tl-wr841 Firmware -
Tp-link Tl-wr841n Firmware 3.16.9
Tp-link Tl-wr841n\\(eu\\) Firmware 160325
Tp-link Tl-wr841n Firmware 150616
Tp-link Tl-wr841n Firmware 150310
10
CVSSv2
CVE-2013-2573
A Command Injection vulnerability exists in the ap parameter to the /cgi-bin/mft/wireless_mft.cgi file in TP-Link IP Cameras TL-SC 3130, TL-SC 3130G, 3171G. and 4171G 1.6.18P12s, which could let a malicious user execute arbitrary code.
Tp-link Tl-sc 3130g Firmware
Tp-link Tl-sc 3171g Firmware
Tp-link Tl-sc 4171g Firmware
1 EDB exploit
NA
CVE-2022-46435
An issue in the firmware update process of TP-Link TL-WR941ND V2/V3 up to 3.13.9 and TL-WR941ND V4 up to 3.12.8 allows malicious users to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image.
Tp-link Tl-wr941nd V2 Firmware
Tp-link Tl-wr941nd V3 Firmware
Tp-link Tl-wr941nd V4 Firmware
NA
CVE-2023-30383
TP-LINK Archer C50v2 Archer C50(US)_V2_160801, TP-LINK Archer C20v1 Archer_C20_V1_150707, and TP-LINK Archer C2v1 Archer_C2_US__V1_170228 were discovered to contain a buffer overflow which may lead to a Denial of Service (DoS) when parsing crafted data.
Tp-link Archer C2 V1 Firmware 170228
Tp-link Archer C20 Firmware 150707
Tp-link Archer C50 Firmware 160801
NA
CVE-2023-39745
TP-Link TL-WR940N V2, TP-Link TL-WR941ND V5 and TP-Link TL-WR841N V8 were discovered to contain a buffer overflow via the component /userRpm/AccessCtrlAccessRulesRpm. This vulnerability allows malicious users to cause a Denial of Service (DoS) via a crafted GET request.
Tp-link Tl-wr940n V2 Firmware -
Tp-link Tl-wr941nd V5 Firmware -
Tp-link Tl-wr841n V8 Firmware -
NA
CVE-2023-39747
TP-Link WR841N V8, TP-Link TL-WR940N V2, and TL-WR941ND V5 were discovered to contain a buffer overflow via the radiusSecret parameter at /userRpm/WlanSecurityRpm.
Tp-link Tl-wr940n V2 Firmware -
Tp-link Tl-wr941nd V5 Firmware -
Tp-link Tl-wr841n V8 Firmware -
NA
CVE-2023-33536
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 exists to contain a buffer overflow via the component /userRpm/WlanMacFilterRpm.
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr740n Firmware -
NA
CVE-2023-33538
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 exists to contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm .
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr740n Firmware -
5
CVSSv2
CVE-2018-14080
An issue exists on D-Link DIR-809 A1 up to and including 1.09, A2 up to and including 1.11, and Guest Zone up to and including 1.09 devices. One can bypass authentication mechanisms to download the configuration file.
D-link Dir-809 A1 Firmware
D-link Dir-809 A2 Firmware
D-link Dir-809 Guestzone Firmware
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4671
unauthorized
CVE-2024-4776
CVE-2024-3407
CVE-2024-26026
CVE-2024-32888
wireless
CVE-2024-4656
template injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »