Vulnerabilities > TP Link > Archer C5 Firmware

DATE CVE VULNERABILITY TITLE RISK
2023-01-11 CVE-2022-4498 Out-of-bounds Write vulnerability in Tp-Link Archer C5 Firmware and Tl-Wr710N Firmware
In TP-Link routers, Archer C5 and WR710N-V1, running the latest available code, when receiving HTTP Basic Authentication the httpd service can be sent a crafted packet that causes a heap overflow.
network
low complexity
tp-link CWE-787
critical
9.8
2023-01-11 CVE-2022-4499 Information Exposure Through Discrepancy vulnerability in Tp-Link Archer C5 Firmware and Tl-Wr710N Firmware
TP-Link routers, Archer C5 and WR710N-V1, using the latest software, the strcmp function used for checking credentials in httpd, is susceptible to a side-channel attack.
network
low complexity
tp-link CWE-203
7.5
2020-12-26 CVE-2020-35575 Unspecified vulnerability in Tp-Link products
A password-disclosure issue in the web interface on certain TP-Link devices allows a remote attacker to get full administrative access to the web panel.
network
low complexity
tp-link
critical
9.8
2018-11-26 CVE-2018-19537 Unrestricted Upload of File with Dangerous Type vulnerability in Tp-Link Archer C5 Firmware 2160201Us
TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account.
network
low complexity
tp-link CWE-434
7.2