cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-54127,https://securityvulnerability.io/vulnerability/CVE-2024-54127,Vulnerability in TP-Link Archer C50 Could Allow Access to Wi-Fi Credentials,This vulnerability exists in the TP-Link Archer C50 due to presence of terminal access on a serial interface without proper access control. An attacker with physical access could exploit this by accessing the UART shell on the vulnerable device. Successful exploitation of this vulnerability could allow the attacker to obtain Wi-Fi credentials of the targeted system.,Tp-link,Archer C50 Wireless Router,,,0.0004299999854993075,false,false,false,false,,false,false,2024-12-05T12:19:24.519Z,0 CVE-2024-54126,https://securityvulnerability.io/vulnerability/CVE-2024-54126,Vulnerability in TP-Link Archer C50's Firmware Upgrade Process,This vulnerability exists in the TP-Link Archer C50 due to improper signature verification mechanism in the firmware upgrade process at its web interface. An attacker with administrative privileges within the router’s Wi-Fi range could exploit this vulnerability by uploading and executing malicious firmware which could lead to complete compromise of the targeted device.,Tp-link,Archer C50 Wireless Router,,,0.0004299999854993075,false,false,false,false,,false,false,2024-12-05T12:14:41.814Z,0 CVE-2023-31188,https://securityvulnerability.io/vulnerability/CVE-2023-31188,Command Injection Vulnerability in TP-LINK Routers,"A vulnerability exists in multiple TP-LINK Archer routers that allows a network-adjacent authenticated attacker to execute arbitrary OS commands. This issue arises due to improper validation of input, permitting malicious actions through crafted requests. Users of the Archer C50, C55, and C20 routers must promptly update their firmware to ensure protection from potential exploitation. Detailed firmware versions that require updating are listed in the affected products section.",Tp-link,"Archer C50,Archer C55,Archer C20",8,HIGH,0.0005699999746866524,false,false,false,false,,false,false,2023-09-06T10:15:00.000Z,0 CVE-2023-32619,https://securityvulnerability.io/vulnerability/CVE-2023-32619,Command Injection Vulnerability in TP-Link Archer C50 and C55 Routers,The TP-Link Archer C50 and Archer C55 routers suffer from a command injection vulnerability due to the use of hard-coded credentials. This security flaw allows network-adjacent unauthenticated attackers to execute arbitrary OS commands on the affected devices. Users should update their firmware to the specified versions to mitigate this risk and secure their network devices.,Tp-link,"Archer C50,Archer C55",8.8,HIGH,0.0006799999973736703,false,false,false,false,,false,false,2023-09-06T10:15:00.000Z,0 CVE-2023-0936,https://securityvulnerability.io/vulnerability/CVE-2023-0936,TP-Link Archer C50 Web Management Interface denial of service,A vulnerability was found in TP-Link Archer C50 V2_160801. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Web Management Interface. The manipulation leads to denial of service. The attack can only be initiated within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-221552.,TP-Link,Archer C50,6.5,MEDIUM,0.0010999999940395355,false,false,false,false,,false,false,2023-02-21T10:15:00.000Z,0 CVE-2020-9375,https://securityvulnerability.io/vulnerability/CVE-2020-9375,,TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.,Tp-link,Archer C50,7.5,HIGH,0.09826000034809113,false,false,false,true,true,false,false,2020-03-25T14:17:59.000Z,0