cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-17891,https://securityvulnerability.io/vulnerability/CVE-2020-17891,,TP-Link Archer C1200 firmware version 1.13 Build 2018/01/24 rel.52299 EU has a XSS vulnerability allowing a remote attacker to execute arbitrary code.,Tp-link,Archer C1200 Firmware,6.1,MEDIUM,0.0010100000072270632,false,false,false,false,,false,false,2021-05-14T19:25:42.000Z,0 CVE-2019-13614,https://securityvulnerability.io/vulnerability/CVE-2019-13614,,"CMD_SET_CONFIG_COUNTRY in the TP-Link Device Debug protocol in TP-Link Archer C1200 1.0.0 Build 20180502 rel.45702 and earlier is prone to a stack-based buffer overflow, which allows a remote attacker to achieve code execution or denial of service by sending a crafted payload to the listening server.",Tp-link,Archer C1200 Firmware,9.8,CRITICAL,0.01066999975591898,false,false,false,false,,false,false,2019-07-17T17:06:21.000Z,0 CVE-2019-13613,https://securityvulnerability.io/vulnerability/CVE-2019-13613,,"CMD_FTEST_CONFIG in the TP-Link Device Debug protocol in TP-Link Wireless Router Archer Router version 1.0.0 Build 20180502 rel.45702 (EU) and earlier is prone to a stack-based buffer overflow, which allows a remote attacker to achieve code execution or denial of service by sending a crafted payload to the listening server.",Tp-link,Archer C1200 Firmware,9.8,CRITICAL,0.01066999975591898,false,false,false,false,,false,false,2019-07-17T16:58:51.000Z,0 CVE-2018-13134,https://securityvulnerability.io/vulnerability/CVE-2018-13134,,TP-Link Archer C1200 1.13 Build 2018/01/24 rel.52299 EU devices have XSS via the PATH_INFO to the /webpages/data URI.,Tp-link,Archer C1200 Firmware,6.1,MEDIUM,0.0011599999852478504,false,false,false,false,,false,false,2018-07-04T08:00:00.000Z,0