cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-2188,https://securityvulnerability.io/vulnerability/CVE-2024-2188,Unauthenticated XSS Vulnerability in TP-Link Archer AX50 Firmware,"Cross-Site Scripting (XSS) vulnerability stored in TP-Link Archer AX50 affecting firmware version 1.0.11 build 2022052. This vulnerability could allow an unauthenticated attacker to create a port mapping rule via a SOAP request and store a malicious JavaScript payload within that rule, which could result in an execution of the JavaScript payload when the rule is loaded.",Tp-link,Archer Ax50,6.1,MEDIUM,0.0004299999854993075,false,false,false,true,true,false,false,2024-03-05T12:15:25.297Z,0 CVE-2023-40357,https://securityvulnerability.io/vulnerability/CVE-2023-40357,OS Command Execution Vulnerability in TP-LINK Archer Products,"Multiple TP-LINK Archer routers have a vulnerability that allows network-adjacent authenticated attackers to execute arbitrary OS commands. This affects various firmware versions across the Archer AX50, A10, AX10, and AX11000 models, highlighting the importance of keeping devices updated to mitigate potential security threats.",Tp-link,"Archer Ax50,Archer A10,Archer Ax10,Archer Ax11000",8,HIGH,0.0006099999882280827,false,false,false,false,,false,false,2023-09-06T10:15:00.000Z,0 CVE-2022-30075,https://securityvulnerability.io/vulnerability/CVE-2022-30075,,"In TP-Link Router AX50 firmware 210730 and older, import of a malicious backup file via web interface can lead to remote code execution due to improper validation.",Tp-link,Archer Ax50 Firmware,8.8,HIGH,0.4654900133609772,false,false,false,true,true,false,false,2022-06-09T00:59:47.000Z,0