cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-34832,https://securityvulnerability.io/vulnerability/CVE-2023-34832,Buffer Overflow Vulnerability in TP-Link Archer AX10 Router,"A buffer overflow vulnerability has been identified in the TP-Link Archer AX10 (EU) V1.2_230220. This security flaw, located in the function FUN_131e8 - 0x132B4, allows an attacker to execute arbitrary code on the device. Exploitation could potentially lead to unauthorized access or a complete system compromise, thereby exposing sensitive data and disrupting network integrity. Users are encouraged to review system settings and apply necessary updates to mitigate risks.",Tp-link,Archer Ax10 Firmware,9.8,CRITICAL,0.03061000071465969,false,false,false,false,,false,false,2023-06-16T00:00:00.000Z,0 CVE-2022-40486,https://securityvulnerability.io/vulnerability/CVE-2022-40486,,TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) was discovered to allow authenticated attackers to execute arbitrary code via a crafted backup file.,Tp-link,Archer Ax10 V1 Firmware,8.8,HIGH,0.005040000192821026,false,false,false,false,,false,false,2022-09-28T12:59:46.000Z,0 CVE-2021-41451,https://securityvulnerability.io/vulnerability/CVE-2021-41451,,"A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated attacker to send a specially crafted HTTP request and receive a misconfigured HTTP/0.9 response, potentially leading into a cache poisoning attack.",Tp-link,Archer Ax10 Firmware,7.5,HIGH,0.004480000119656324,false,false,false,false,,false,false,2021-12-17T14:32:24.000Z,0 CVE-2021-41450,https://securityvulnerability.io/vulnerability/CVE-2021-41450,,An HTTP request smuggling attack in TP-Link AX10v1 before v1_211117 allows a remote unauthenticated attacker to DoS the web application via sending a specific HTTP packet.,Tp-link,Archer Ax10 V1 Firmware,7.5,HIGH,0.0069599999114871025,false,false,false,false,,false,false,2021-12-08T15:35:00.000Z,0 CVE-2021-40288,https://securityvulnerability.io/vulnerability/CVE-2021-40288,,"A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames",Tp-link,Archer Ax10 Firmware,7.5,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2021-12-07T19:13:36.000Z,0