Vulnerabilities > TP Link > TL Wr841N Firmware > 0.9.1.4.18
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-09-06 | CVE-2023-36489 | OS Command Injection vulnerability in Tp-Link products Multiple TP-LINK products allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands. | 8.8 |
2022-12-20 | CVE-2022-46912 | Unspecified vulnerability in Tp-Link Tl-Wr841N Firmware and Tl-Wr841Nd V7 Firmware An issue in the firmware update process of TP-Link TL-WR841N / TL-WA841ND V7 3.13.9 and earlier allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image. | 8.8 |
2022-02-24 | CVE-2022-25073 | Out-of-bounds Write vulnerability in Tp-Link Tl-Wr841N Firmware 0.9.14.18 TL-WR841Nv14_US_0.9.1_4.18 routers were discovered to contain a stack overflow in the function dm_fillObjByStr(). | 9.8 |
2021-01-26 | CVE-2020-35576 | OS Command Injection vulnerability in Tp-Link Tl-Wr841N Firmware A Command Injection issue in the traceroute feature on TP-Link TL-WR841N V13 (JP) with firmware versions prior to 201216 allows authenticated users to execute arbitrary code as root via shell metacharacters, a different vulnerability than CVE-2018-12577. | 8.8 |