Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tp-link vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-37284
Improper authentication vulnerability in Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616' allows a network-adjacent unauthenticated malicious user to execute an arbitrary OS command via a crafted request to bypass authentication.
Tp-link Archer C20 Firmware
NA
CVE-2023-36489
Multiple TP-LINK products allow a network-adjacent unauthenticated malicious user to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior to 'TL-W...
Tp-link Tl-wr902ac Firmware
Tp-link Tl-wr802n Firmware
Tp-link Tl-wr841n Firmware
NA
CVE-2023-39224
Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated malicious user to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product i...
Tp-link Archer C7 Firmware
NA
CVE-2023-39935
Archer C5400 firmware versions prior to 'Archer C5400(JP)_V2_230506' allows a network-adjacent authenticated malicious user to execute arbitrary OS commands.
Tp-link Archer C5400 Firmware
NA
CVE-2023-38908
An issue in TPLink Smart Bulb Tapo series L530 prior to 1.2.4, L510E prior to 1.1.0, L630 prior to 1.0.4, P100 prior to 1.5.0, and Tapo Application 2.8.14 allows a remote malicious user to obtain sensitive information via the TSKEP authentication function.
Tp-link Tapo 2.8.14
Tp-link Tapo L530e Firmware 1.0.0
NA
CVE-2023-38909
An issue in TPLink Smart Bulb Tapo series L530 prior to 1.2.4, L510E prior to 1.1.0, L630 prior to 1.0.4, P100 prior to 1.5.0, and Tapo Application 2.8.14 allows a remote malicious user to obtain sensitive information via the IV component in the AES128-CBC function.
Tp-link Tapo 2.8.14
Tp-link Tapo L530e Firmware 1.0.0
NA
CVE-2023-38906
An issue in TPLink Smart Bulb Tapo series L530 1.1.9, L510E 1.0.8, L630 1.0.3, P100 1.4.9, Smart Camera Tapo series C200 1.1.18, and Tapo Application 2.8.14 allows a remote malicious user to obtain sensitive information via the authentication code for the UDP message.
Tp-link Tapo 2.8.14
Tp-link Tapo L530e Firmware 1.0.0
NA
CVE-2023-39751
TP-Link TL-WR941ND V6 were discovered to contain a buffer overflow via the pSize parameter at /userRpm/PingIframeRpm.
Tp-link Tl-wr941nd V6 Firmware -
NA
CVE-2023-39745
TP-Link TL-WR940N V2, TP-Link TL-WR941ND V5 and TP-Link TL-WR841N V8 were discovered to contain a buffer overflow via the component /userRpm/AccessCtrlAccessRulesRpm. This vulnerability allows malicious users to cause a Denial of Service (DoS) via a crafted GET request.
Tp-link Tl-wr940n V2 Firmware -
Tp-link Tl-wr941nd V5 Firmware -
Tp-link Tl-wr841n V8 Firmware -
NA
CVE-2023-39747
TP-Link WR841N V8, TP-Link TL-WR940N V2, and TL-WR941ND V5 were discovered to contain a buffer overflow via the radiusSecret parameter at /userRpm/WlanSecurityRpm.
Tp-link Tl-wr940n V2 Firmware -
Tp-link Tl-wr941nd V5 Firmware -
Tp-link Tl-wr841n V8 Firmware -
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
path traversal
CVE-2024-33545
CVE-2024-35725
CVE-2024-32704
overflow
file upload
CVE-2024-0230
CVE-2024-32705
CVE-2024-23692
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
4
5
6
7
8
9
10
NEXT »