Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tp-link tl-wr841n firmware - vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-5687
Directory traversal vulnerability in the web-based management feature on the TP-LINK TL-WR841N router with firmware 3.13.9 build 120201 Rel.54965n and previous versions allows remote malicious users to read arbitrary files via a .. (dot dot) in the PATH_INFO to the help/ URI.
Tp-link Tl-wr841n -
Tp-link Tl-wr841n Firmware
1 EDB exploit
NA
CVE-2012-6316
Multiple cross-site scripting (XSS) vulnerabilities in the TP-LINK TL-WR841N router with firmware 3.13.9 Build 120201 Rel.54965n and previous versions allow remote administrators to inject arbitrary web script or HTML via the (1) username or (2) pwd parameter to userRpm/NoipDdnsR...
Tp-link Tl-wr841n Firmware
Tp-link Tl-wr841n -
NA
CVE-2012-6276
Directory traversal vulnerability in the web-based management interface on the TP-LINK TL-WR841N router with firmware 3.13.9 build 120201 Rel.54965n and previous versions allows remote malicious users to read arbitrary files via the URL parameter.
Tp-link Tl-wr841n Firmware 3.13.9
Tp-link Tl-wr841n -
1 EDB exploit
8.8
CVSSv3
CVE-2022-30024
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V12 (firmware version 3.16.9) devices allows an authenticated remote malicious user to execute arbitrary code via a GET request to the page for the System Tools of the Wi-Fi network. This affects TL-WR841 V12 TL-WR841N(EU...
Tp-link Tl-wr841 Firmware -
Tp-link Tl-wr841n Firmware 3.16.9
Tp-link Tl-wr841n\\(eu\\) Firmware 160325
Tp-link Tl-wr841n Firmware 150616
Tp-link Tl-wr841n Firmware 150310
8.8
CVSSv3
CVE-2023-36489
Multiple TP-LINK products allow a network-adjacent unauthenticated malicious user to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior to 'TL-W...
Tp-link Tl-wr902ac Firmware
Tp-link Tl-wr802n Firmware
Tp-link Tl-wr841n Firmware
NA
CVE-2015-3035
Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware prior to 150317, C7 (2.0) with firmware prior to 150304, and C8 (1.0) with firmware prior to 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware prior to 150302,...
Tp-link Tl-wr841n \\(9.0\\) Firmware
Tp-link Tl-wr740n \\(5.0\\) Firmware
Tp-link Archer C5 \\(1.2\\) Firmware
Tp-link Tl-wr841n \\(10.0\\) Firmware
Tp-link Tl-wr741nd \\(5.0\\) Firmware
Tp-link Tl-wr741nd \\(5.0\\)
Tp-link Tl-wdr3600 \\(1.0\\) Firmware
Tp-link Archer C7 \\(2.0\\) Firmware
Tp-link Tl-wr841nd \\(10.0\\) Firmware 150104
Tp-link Archer C9 \\(1.0\\) Firmware
Tp-link Tl-wr841nd \\(9.0\\) Firmware
Tp-link Archer C8 \\(1.0\\) Firmware
Tp-link Tl-wdr4300 \\(1.0\\) Firmware
Tp-link Tl-wdr3500 \\(1.0\\) Firmware
8.8
CVSSv3
CVE-2022-46912
An issue in the firmware update process of TP-Link TL-WR841N / TL-WA841ND V7 3.13.9 and previous versions allows malicious users to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image.
Tp-link Tl-wr841n Firmware
Tp-link Tl-wr841nd V7 Firmware
8.8
CVSSv3
CVE-2020-35576
A Command Injection issue in the traceroute feature on TP-Link TL-WR841N V13 (JP) with firmware versions before 201216 allows authenticated users to execute arbitrary code as root via shell metacharacters, a different vulnerability than CVE-2018-12577.
Tp-link Tl-wr841n Firmware
7.2
CVSSv3
CVE-2020-8423
A buffer overflow in the httpd daemon on TP-Link TL-WR841N V10 (firmware version 3.16.9) devices allows an authenticated remote malicious user to execute arbitrary code via a GET request to the page for the configuration of the Wi-Fi network.
Tp-link Tl-wr841n Firmware 3.16.9
1 Github repository
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started