cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2019-13266,https://securityvulnerability.io/vulnerability/CVE-2019-13266,Insufficient Compartmentalization in TP-Link Archer C3200 and Archer C2 Products,"The TP-Link Archer C3200 V1 and Archer C2 V1 devices exhibit insufficient compartmentalization between the host and guest networks. When a DHCP Request is sent with a specific Transaction ID, the router's response can erroneously allow the same Transaction ID to be sent to both networks. This flaw enables potential data encoding transmissions to be directed across the router, creating a risk of unauthorized data access and communication between isolated networks.",Tp-link,Archer C3200 V1 Firmware,8.8,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2019-08-27T17:06:10.000Z,0 CVE-2019-13267,https://securityvulnerability.io/vulnerability/CVE-2019-13267,Insufficient Network Segregation in TP-Link Archer Devices,"The TP-Link Archer C3200 V1 and Archer C2 V1 devices exhibit insufficient compartmentalization between host and guest networks established on the same device. This vulnerability allows attackers to exploit the IGMP protocol to facilitate unauthorized data transfers from the host network to the guest network. When a device leaves an IGMP group, it triggers the router to generate an IGMP Membership Query, which is sent to both networks, thus potentially exposing sensitive data via the Group IP field manipulated by the sender.",Tp-link,Archer C3200 V1 Firmware,8.8,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2019-08-27T17:05:39.000Z,0 CVE-2019-13268,https://securityvulnerability.io/vulnerability/CVE-2019-13268,Insufficient Compartmentalization in TP-Link Router Products,"TP-Link Archer C3200 V1 and Archer C2 V1 devices exhibit insufficient compartmentalization between the host and guest networks. This vulnerability allows ARP requests to be forwarded between both networks without restrictions. As a result, an attacker can exploit this flaw to send ARP requests to arbitrary devices, potentially enabling unauthorized information access or network interference. The routing of these requests without limitations undermines network security measures, putting devices connected to both networks at risk.",Tp-link,Archer C3200 V1 Firmware,8.8,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2019-08-27T17:05:06.000Z,0