cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-40486,https://securityvulnerability.io/vulnerability/CVE-2022-40486,Archer AX10 Router Vulnerability Allows Code Execution by Authenticated Attackers,"The TP Link Archer AX10 router firmware version 1.3.1 allows authenticated attackers to exploit a vulnerability by uploading a specially crafted backup file. This oversight enables attackers to execute arbitrary code on the device, potentially compromising its security and functionality. Users of this router model should be aware of this risk and apply necessary security updates promptly to protect their networks.",Tp-link,Archer Ax10 V1 Firmware,8.8,HIGH,0.005040000192821026,false,,false,false,false,,,false,false,,2022-09-28T12:59:46.000Z,0 CVE-2021-41450,https://securityvulnerability.io/vulnerability/CVE-2021-41450,HTTP Request Smuggling Vulnerability in TP-Link Archer AX10 Router,"A vulnerability exists in the TP-Link Archer AX10 router that allows an unauthenticated remote attacker to exploit HTTP request smuggling techniques. By sending specially crafted HTTP packets, an attacker can cause a denial-of-service (DoS) condition, halting the web application's normal operation. This vulnerability primarily affects versions of the Archer AX10 router prior to the firmware update v1_211117, leaving many devices susceptible to exploitation and unauthorized access. Users are encouraged to update their devices to the latest firmware to mitigate this risk.",Tp-link,Archer Ax10 V1 Firmware,7.5,HIGH,0.0069599999114871025,false,,false,false,false,,,false,false,,2021-12-08T15:35:00.000Z,0