Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
link vulnerabilities and exploits
(subscribe to this query)
7.8
CVSSv2
CVE-2022-32058
An infinite loop in the function httpRpmPass of TP-Link TL-WR741N/TL-WR742N V1/V2/V3_130415 allows malicious users to cause a Denial of Service (DoS) via a crafted packet.
Tp-link Tl-wr741n Firmware -
Tp-link Tl-wr742n Firmware -
Tp-link Tl-wr741n Firmware V3 130415
Tp-link Tl-wr742n Firmware V3 130415
1 Github repository
NA
CVE-2022-30024
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote malicious user to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU...
Tp-link Tl-wr841 Firmware -
Tp-link Tl-wr841n Firmware 3.16.9
Tp-link Tl-wr841n\\(eu\\) Firmware 160325
Tp-link Tl-wr841n Firmware 150616
Tp-link Tl-wr841n Firmware 150310
7.8
CVSSv2
CVE-2020-9375
TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote malicious users to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.
Tp-link Archer C50 Build 170822
Tp-link Archer C50 Build 171227
Tp-link Archer C50 Build 200318
1 Github repository
5
CVSSv2
CVE-2018-14080
An issue exists on D-Link DIR-809 A1 up to and including 1.09, A2 up to and including 1.11, and Guest Zone up to and including 1.09 devices. One can bypass authentication mechanisms to download the configuration file.
D-link Dir-809 A1 Firmware
D-link Dir-809 A2 Firmware
D-link Dir-809 Guestzone Firmware
5
CVSSv2
CVE-2018-14081
An issue exists on D-Link DIR-809 A1 up to and including 1.09, A2 up to and including 1.11, and Guest Zone up to and including 1.09 devices. Device passwords, such as the admin password and the WPA key, are stored in cleartext.
D-link Dir-809 A1 Firmware
D-link Dir-809 A2 Firmware
D-link Dir-809 Guestzone Firmware
NA
CVE-2022-46910
An issue in the firmware update process of TP-Link TL-WA901ND V1 up to v3.11.2 and TL-WA901N V2 up to v3.12.16 allows malicious users to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image.
Tp-link Tl-wa901n Firmware
Tp-link Tl-wa901nd V1 Firmware
Tp-link Tl-wa901nd V2 Firmware
NA
CVE-2022-46435
An issue in the firmware update process of TP-Link TL-WR941ND V2/V3 up to 3.13.9 and TL-WR941ND V4 up to 3.12.8 allows malicious users to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image.
Tp-link Tl-wr941nd V2 Firmware
Tp-link Tl-wr941nd V3 Firmware
Tp-link Tl-wr941nd V4 Firmware
NA
CVE-2023-36357
An issue in the /userRpm/LocalManageControlRpm component of TP-Link TL-WR940N V2/V4/V6, TL-WR841N V8/V10, and TL-WR941ND V5 allows malicious users to cause a Denial of Service (DoS) via a crafted GET request.
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr941nd Firmware -
NA
CVE-2023-36359
TP-Link TL-WR940N V4, TL-WR841N V8/V10, TL-WR940N V2/V3 and TL-WR941ND V5/V6 were discovered to contain a buffer overflow in the component /userRpm/QoSRuleListRpm. This vulnerability allows malicious users to cause a Denial of Service (DoS) via a crafted GET request.
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr941nd Firmware -
NA
CVE-2023-33536
TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 exists to contain a buffer overflow via the component /userRpm/WlanMacFilterRpm.
Tp-link Tl-wr940n Firmware -
Tp-link Tl-wr841n Firmware -
Tp-link Tl-wr740n Firmware -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
firewall
open redirect
CVE-2024-3946
LFI
CVE-2024-25977
CVE-2024-36368
CVE-2024-23109
CVE-2024-23580
CVE-2024-23108
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »