Vulnerabilities (CVE)

Join the Common Vulnerabilities and Exposures (CVE) community and start to get notified about new vulnerabilities.

Filtered by vendor Tp-link Subscribe
Total 262 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2018-10168 1 Tp-link 1 Eap Controller 2019-10-02 6.5 MEDIUM 8.8 HIGH
TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows do not control privileges for usage of the Web API, allowing a low-privilege user to make any request as an Administrator. This is fixed in version 2.6.1_Windows.
CVE-2017-8218 1 Tp-link 4 C2, C20i, C20i Firmware and 1 more 2019-10-02 10.0 HIGH 9.8 CRITICAL
vsftpd on TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n has a backdoor admin account with the 1234 password, a backdoor guest account with the guest password, and a backdoor test account with the test password.
CVE-2017-8077 1 Tp-link 2 Tl-sg108e, Tl-sg108e Firmware 2019-10-02 5.0 MEDIUM 7.5 HIGH
On the TP-Link TL-SG108E 1.0, there is a hard-coded ciphering key (a long string beginning with Ei2HNryt). This affects the 1.1.2 Build 20141017 Rel.50749 firmware.
CVE-2017-8220 1 Tp-link 4 C2, C20i, C20i Firmware and 1 more 2019-10-02 9.0 HIGH 9.9 CRITICAL
TP-Link C2 and C20i devices through firmware 0.9.1 4.2 v0032.0 Build 160706 Rel.37961n allow remote code execution with a single HTTP request by placing shell commands in a "host=" line within HTTP POST data.
CVE-2017-17758 1 Tp-link 30 Tl-war1200l, Tl-war1200l Firmware, Tl-war1300l and 27 more 2019-10-02 9.0 HIGH 8.8 HIGH
TP-Link TL-WVR and TL-WAR devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the interface field of an admin/dhcps command to cgi-bin/luci, related to the zone_get_iface_bydev function in /usr/lib/lua/luci/controller/admin/dhcps.lua in uhttpd.
CVE-2017-17757 1 Tp-link 30 Tl-war1200l, Tl-war1200l Firmware, Tl-war1300l and 27 more 2019-10-02 9.0 HIGH 8.8 HIGH
TP-Link TL-WVR and TL-WAR devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the interface field of an admin/wportal command to cgi-bin/luci, related to the get_device_byif function in /usr/lib/lua/luci/controller/admin/wportal.lua in uhttpd.
CVE-2017-17747 1 Tp-link 2 Tl-sg108e, Tl-sg108e Firmware 2019-10-02 2.7 LOW 6.5 MEDIUM
Weak access controls in the Device Logout functionality on the TP-Link TL-SG108E v1.0.0 allow remote attackers to call the logout functionality, triggering a denial of service condition.
CVE-2017-17746 1 Tp-link 2 Tl-sg108e, Tl-sg108e Firmware 2019-10-02 7.7 HIGH 6.8 MEDIUM
Weak access control methods on the TP-Link TL-SG108E 1.0.0 allow any user on a NAT network with an authenticated administrator to access the device without entering user credentials. The authentication record is stored on the device; thus if an administrator authenticates from a NAT network, the authentication applies to the IP address of the NAT gateway, and any user behind that NAT gateway is also treated as authenticated.
CVE-2017-16958 1 Tp-link 108 Tl-er3210g, Tl-er3210g Firmware, Tl-er3220g and 105 more 2019-10-02 9.0 HIGH 8.8 HIGH
TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the t_bindif field of an admin/bridge command to cgi-bin/luci, related to the get_device_byif function in /usr/lib/lua/luci/controller/admin/bridge.lua in uhttpd.
CVE-2017-16957 1 Tp-link 108 Tl-er3210g, Tl-er3210g Firmware, Tl-er3220g and 105 more 2019-10-02 9.0 HIGH 8.8 HIGH
TP-Link TL-WVR, TL-WAR, TL-ER, and TL-R devices allow remote authenticated users to execute arbitrary commands via shell metacharacters in the iface field of an admin/diagnostic command to cgi-bin/luci, related to the zone_get_effect_devices function in /usr/lib/lua/luci/controller/admin/diagnostic.lua in uhttpd.
CVE-2019-13268 1 Tp-link 4 Archer C2 V1, Archer C2 V1 Firmware, Archer C3200 V1 and 1 more 2019-09-03 5.8 MEDIUM 8.8 HIGH
TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet mask, but these routers did not restrict this traffic in any way. Depending on this factor, one must use either the lower 8 bits of the IP address, or the entire 32 bits, as the data payload.)
CVE-2019-12104 1 Tp-link 2 M7350, M7350 Firmware 2019-08-19 9.0 HIGH 8.8 HIGH
The web-based configuration interface of the TP-Link M7350 V3 with firmware before 190531 is affected by several post-authentication command injection vulnerabilities.
CVE-2019-12195 1 Tp-link 2 Tl-wr840n, Tl-wr840n Firmware 2019-05-29 3.5 LOW 4.8 MEDIUM
TP-Link TL-WR840N v5 00000005 devices allow XSS via the network name. The attacker must log into the router by breaking the password and going to the admin login page by THC-HYDRA to get the network name. With an XSS payload, the network name changed automatically and the internet connection was disconnected. All the users become disconnected from the internet.
CVE-2016-10719 1 Tp-link 2 Archer Cr700, Archer Cr700 Firmware 2019-05-16 4.3 MEDIUM 6.1 MEDIUM
TP-Link Archer CR-700 1.0.6 devices have an XSS vulnerability that can be introduced into the admin account through a DHCP request, allowing the attacker to steal the cookie information, which contains the base64 encoded username and password.
CVE-2018-15840 1 Tp-link 2 Tl-wr840n, Tl-wr840n Firmware 2019-04-02 5.0 MEDIUM 7.5 HIGH
TP-Link TL-WR840N devices allow remote attackers to cause a denial of service (networking outage) via fragmented packets, as demonstrated by an "nmap -f" command.
CVE-2018-13134 1 Tp-link 2 Archer C1200, Archer C1200 Firmware 2019-03-28 4.3 MEDIUM 6.1 MEDIUM
TP-Link Archer C1200 1.13 Build 2018/01/24 rel.52299 EU devices have XSS via the PATH_INFO to the /webpages/data URI.
CVE-2018-18428 1 Tp-link 2 Tl-sc3130, Tl-sc3130 Firmware 2019-01-23 5.0 MEDIUM 7.5 HIGH
TP-Link TL-SC3130 1.6.18P12_121101 devices allow unauthenticated RTSP stream access, as demonstrated by a /jpg/image.jpg URI.
CVE-2018-20372 1 Tp-link 2 Td-w8961nd, Td-w8961nd Firmware 2019-01-11 3.5 LOW 5.4 MEDIUM
TP-Link TD-W8961ND devices allow XSS via the hostname of a DHCP client.
CVE-2018-19537 1 Tp-link 2 Archer C5, Archer C5 Firmware 2018-12-28 9.0 HIGH 7.2 HIGH
TP-Link Archer C5 devices through V2_160201_US allow remote command execution via shell metacharacters on the wan_dyn_hostname line of a configuration file that is encrypted with the 478DA50BF9E3D2CF key and uploaded through the web GUI by using the web admin account. The default password of admin may be used in some cases.
CVE-2018-19528 1 Tp-link 2 Tl-wr886n, Tl-wr886n Firmware 2018-12-19 10.0 HIGH 9.8 CRITICAL
TP-Link TL-WR886N 7.0 1.1.0 devices allow remote attackers to cause a denial of service (Tlb Load Exception) via crafted DNS packets to port 53/udp.