Vulnerabilities > TP Link > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2018-10-01 | CVE-2018-15702 | Cross-Site Request Forgery (CSRF) vulnerability in Tp-Link Tl-Wrn841N Firmware 0.9.14.16V0348.0 The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to CSRF due to insufficient validation of the referer field. | 8.8 |
2018-08-15 | CVE-2018-15172 | Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Tp-Link Tl-Wr840N Firmware 0.9.1 TP-Link WR840N devices have a buffer overflow via a long Authorization HTTP header. | 7.5 |
2018-07-19 | CVE-2018-14336 | Improper Input Validation vulnerability in Tp-Link Wr840N TP-Link WR840N devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses. | 7.5 |
2018-07-02 | CVE-2018-12577 | OS Command Injection vulnerability in Tp-Link Tl-Wr841N Firmware 0.9.14.16 The Ping and Traceroute features on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices allow authenticated blind Command Injection. | 8.8 |
2018-07-02 | CVE-2018-12574 | Cross-Site Request Forgery (CSRF) vulnerability in Tp-Link Tl-Wr841N Firmware 0.9.14.16 CSRF exists for all actions in the web interface on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices. | 8.8 |
2018-06-23 | CVE-2018-12694 | Improper Input Validation vulnerability in Tp-Link Tl-Wa850Re Firmware TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote attackers to cause a denial of service (reboot) via data/reboot.json. | 7.5 |
2018-06-23 | CVE-2018-12692 | OS Command Injection vulnerability in Tp-Link Tl-Wa850Re Firmware TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the wps_setup_pin parameter to /data/wps.setup.json. | 8.8 |
2018-05-30 | CVE-2018-11481 | Improper Input Validation vulnerability in Tp-Link products TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-*, and TL-IPC40A-4 devices allow authenticated remote code execution via crafted JSON data because /usr/lib/lua/luci/torchlight/validator.lua does not block various punctuation characters. | 8.8 |
2018-05-03 | CVE-2018-10168 | Improper Privilege Management vulnerability in Tp-Link EAP Controller 2.5.4/2.6.0 TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows do not control privileges for usage of the Web API, allowing a low-privilege user to make any request as an Administrator. | 8.8 |
2018-05-03 | CVE-2018-10167 | Use of Hard-coded Credentials vulnerability in Tp-Link EAP Controller 2.5.4/2.6.0 The web application backup file in the TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows is encrypted with a hard-coded cryptographic key, so anyone who knows that key and the algorithm can decrypt it. | 7.5 |