cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-17891,https://securityvulnerability.io/vulnerability/CVE-2020-17891,Cross-Site Scripting Vulnerability in TP-Link Archer C1200 Firmware,"The TP-Link Archer C1200 firmware version 1.13 Build 2018/01/24 rel.52299 EU contains a Cross-Site Scripting vulnerability. This security flaw allows an attacker to exploit the device remotely, enabling them to execute arbitrary code. Improper input validation may lead to unauthorized actions within the web interface of the router, potentially compromising user data and network integrity.",Tp-link,Archer C1200 Firmware,6.1,MEDIUM,0.001769999973475933,false,,false,false,false,,,false,false,,2021-05-14T19:25:42.000Z,0 CVE-2019-13614,https://securityvulnerability.io/vulnerability/CVE-2019-13614,Stack Buffer Overflow in TP-Link Archer C1200 Device Firmware,"The TP-Link Archer C1200 device is susceptible to a stack-based buffer overflow through the CMD_SET_CONFIG_COUNTRY command in its Debug protocol. By sending a specially crafted payload to the device's listening server, a remote attacker may execute arbitrary code or trigger a denial of service. Users are urged to review their device firmware and apply necessary updates to mitigate potential risks.",Tp-link,Archer C1200 Firmware,9.8,CRITICAL,0.01066999975591898,false,,false,false,false,,,false,false,,2019-07-17T17:06:21.000Z,0 CVE-2019-13613,https://securityvulnerability.io/vulnerability/CVE-2019-13613,Stack-based Buffer Overflow in TP-Link Wireless Router Archer,"A stack-based buffer overflow exists in the TP-Link Device Debug protocol for the Archer Router. This vulnerability allows an attacker to send specially crafted packets to the router's server, which can result in code execution or cause a denial of service. It is crucial for users of affected models to update their firmware to mitigate the risks associated with this security flaw.",Tp-link,Archer C1200 Firmware,9.8,CRITICAL,0.01066999975591898,false,,false,false,false,,,false,false,,2019-07-17T16:58:51.000Z,0 CVE-2018-13134,https://securityvulnerability.io/vulnerability/CVE-2018-13134,,TP-Link Archer C1200 1.13 Build 2018/01/24 rel.52299 EU devices have XSS via the PATH_INFO to the /webpages/data URI.,Tp-link,Archer C1200 Firmware,6.1,MEDIUM,0.0011599999852478504,false,,false,false,false,,,false,false,,2018-07-04T08:00:00.000Z,0