cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2025-1099,https://securityvulnerability.io/vulnerability/CVE-2025-1099,Hard-coded RSA Key Vulnerability in TP-Link Tapo C500 Cameras,"The TP-Link Tapo C500 Wi-Fi security cameras, namely versions V1 and V2, are vulnerable due to a hard-coded RSA private key embedded in their firmware. This flaw allows an attacker with physical access to the device to extract these cryptographic keys. Once compromised, these keys can facilitate impersonation attacks, enable data decryption, and allow for man-in-the-middle attacks against the vulnerable device, posing significant risks to the integrity and security of surveillance operations.",Tp-link,"Tapo C500 V1 Wi-fi Camera,Tapo C500 V2 Wi-fi Camera",7,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-02-10T10:44:26.274Z,0 CVE-2024-54887,https://securityvulnerability.io/vulnerability/CVE-2024-54887,Buffer Overflow in TP-Link Routers Allowing Code Execution,"The TP-Link TL-WR940N V3 and V4 with firmware 3.16.9 and earlier are susceptible to a buffer overflow vulnerability through the dnsserver1 and dnsserver2 parameters located at /userRpm/Wan6to4TunnelCfgRpm.htm. An authenticated attacker can exploit this vulnerability to execute arbitrary code on the device, gaining potentially unauthorized access and control in the context of the root user. This issue emphasizes the need for timely firmware updates and robust security practices for device management.",TP-Link,,8,HIGH,0.0004299999854993075,false,,true,false,true,2025-01-21T17:08:44.000Z,false,false,false,,2025-01-09T20:15:00.000Z,1109 CVE-2024-46340,https://securityvulnerability.io/vulnerability/CVE-2024-46340,Plaintext Credential Transmission in TP-Link Routers,"The TP-Link TL-WR845N routers experience a significant security issue where user credentials are transmitted unencrypted in plaintext following a factory reset. This vulnerability exposes sensitive information that can be intercepted by malicious actors, compromising user account security and overall network integrity. Users of the affected TL-WR845N variants should take immediate precautions and consider updating their devices to mitigate the risks associated with this vulnerability.",TP-Link,TL-WR845N,8.8,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-12-10T20:15:00.000Z,0 CVE-2024-12344,https://securityvulnerability.io/vulnerability/CVE-2024-12344,Memory Corruption Vulnerability in TP-Link VN020 F3v(T) Product,"CVE-2024-12344 represents a severe vulnerability identified in TP-Link's VN020 F3v(T) product line, specifically in firmware version TT_V6.2.1021. The vulnerability is triggered through the FTP USER Command Handler component, leading to potential memory corruption. This flaw can be exploited remotely, allowing attackers to manipulate the system without physical access. Given the public disclosure of the exploit, it is critical for users and administrators to apply necessary security updates and implement protective measures to mitigate risks.",Tp-link,Vn020 F3v(t),9.8,CRITICAL,0.0028099999763071537,false,,false,false,true,2024-12-08T23:15:00.000Z,true,false,false,,2024-12-08T23:15:00.000Z,0 CVE-2024-12343,https://securityvulnerability.io/vulnerability/CVE-2024-12343,Buffer Overflow Vulnerability in TP-Link VN020 F3v(T) SOAP Request Handler,"CVE-2024-12343 identifies a critical buffer overflow vulnerability in the TP-Link VN020 F3v(T) TT_V6.2.1021 associated with the SOAP Request Handler's /control/WANIPConnection endpoint. This vulnerability can be exploited by manipulating the NewConnectionType argument, potentially allowing attackers within the local network to execute arbitrary code or cause a denial of service (DoS). As the exploit has been disclosed publicly, it emphasizes the urgency for users and network administrators to apply necessary patches and mitigate risks associated with this critical vulnerability.",Tp-link,Vn020 F3v(t),8.8,HIGH,0.0007200000109151006,false,,false,false,true,2024-12-08T09:31:05.000Z,true,false,false,,2024-12-08T09:31:05.401Z,0 CVE-2024-11237,https://securityvulnerability.io/vulnerability/CVE-2024-11237,Stack-based Buffer Overflow in TP-Link VN020 F3v(T) DHCP Component,"A significant security flaw has been identified in the TP-Link VN020 F3v(T) device, specifically within its DHCP DISCOVER packet parser. This vulnerability allows for a stack-based buffer overflow, which could be exploited remotely. Attackers can manipulate the hostname argument, leading to potential unauthorized access and control over affected devices. With the exploit made public, it poses a serious threat to users who have not yet secured their systems. It is vital for organizations using this product to implement necessary security patches and maintain vigilant monitoring to mitigate any risks associated with this vulnerability.",Tp-link,Vn020 F3v(t),9.8,CRITICAL,0.002839999971911311,false,,false,false,true,2024-11-15T12:00:15.000Z,true,false,false,,2024-11-15T12:00:15.886Z,0 CVE-2024-22733,https://securityvulnerability.io/vulnerability/CVE-2024-22733,Null Pointer Dereference Vulnerability in TP Link MR200 V4 Firmware,"The TP Link MR200 V4 Firmware version 210201 contains a vulnerability characterized by a null-pointer-dereference in its web administration panel. This issue is triggered through the sign, Action, or LoginStatus query parameters, which may potentially enable an unauthenticated attacker to cause a denial of service (DoS). This vulnerability poses a risk to the device's availability and could disrupt network services, making it imperative for users of affected firmware versions to apply necessary updates to mitigate potential exploitations.",Tp-link,Mr200 Firmware,7.5,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-11-01T00:00:00.000Z,0 CVE-2024-21827,https://securityvulnerability.io/vulnerability/CVE-2024-21827,Leftover Debug Code Vulnerability Allows Arbitrary Command Execution,The Tp-Link ER7206 Omada Gigabit VPN Router contains a leftover debug code vulnerability in its cli_server debug functionality. Attackers can exploit this weakness by sending carefully crafted network requests that may lead to arbitrary command execution on the device. This flaw underscores the importance of immediate updates and security measures to safeguard against potential exploitation.,Tp-link,Er7206 Omada Gigabit Vpn Router,7.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-06-25T14:01:26.644Z,0 CVE-2023-39471,https://securityvulnerability.io/vulnerability/CVE-2023-39471,чной Code Injection Vulnerability Affects TP-Link Routers,"The TP-Link TL-WR841N router is vulnerable to a command injection issue within the ated_tp service, which permits network-adjacent attackers to execute arbitrary code on affected installations. The vulnerability stems from insufficient validation of user input before it is utilized in system calls. Notably, exploitation of this flaw does not require authentication, potentially allowing unauthorized users to run arbitrary code with root privileges. This significantly compromises the integrity and security of the affected devices.",Tp-link,Tl-wr841n,7.5,HIGH,0.000699999975040555,false,,false,false,false,,,false,false,,2024-05-03T02:10:38.498Z,0 CVE-2023-35717,https://securityvulnerability.io/vulnerability/CVE-2023-35717,TP-Link Tapo C210 Password Recovery Authentication Bypass Vulnerability,"The TP-Link Tapo C210 IP camera has a vulnerability within its password recovery process that enables network-adjacent attackers to bypass authentication. This flaw stems from an over-reliance on the secrecy of the password derivation algorithm utilized in generating recovery passwords. As a result, the lack of proper authentication measures allows unauthorized users to access the system, raising significant concerns regarding the security of installations relying on this product. It is essential for users to be aware of this vulnerability and take appropriate measures to secure their devices.",Tp-link,Tapo C210,8.8,HIGH,0.0006500000017695129,false,,false,false,false,,,false,false,,2024-05-03T01:57:38.702Z,0 CVE-2023-27359,https://securityvulnerability.io/vulnerability/CVE-2023-27359,TP-Link AX1800 hotplugd Firewall Rule Race Condition Vulnerability,"A race condition vulnerability within the hotplugd daemon affects TP-Link Archer AX21 routers, allowing remote attackers to gain unauthorized access to LAN-side services. The flaw relates to improper handling of firewall rules, which can lead to exposure of resources intended only for local network users. Attackers can exploit this vulnerability without needing any authentication, potentially using it in combination with other security flaws to execute arbitrary code with root privileges.",Tp-link,Ax1800,9.8,CRITICAL,0.0006500000017695129,false,,false,false,false,,,false,false,,2024-05-03T01:56:11.459Z,0 CVE-2023-27346,https://securityvulnerability.io/vulnerability/CVE-2023-27346,TP-Link AX1800 Firmware Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability,"A vulnerability in the TP-Link AX1800 router firmware allows network-adjacent attackers to exploit a stack-based buffer overflow condition. This exploitation is made possible due to inadequate validation of user-supplied data length during firmware image parsing, which can lead to arbitrary code execution with root privileges. No authentication is necessary to carry out this attack, underscoring the critical need for users to ensure their devices are updated with the latest firmware to mitigate potential risks. For detailed technical insights, refer to ZDI-23-377.",Tp-link,Ax1800,8.8,HIGH,0.0009299999801442027,false,,false,false,false,,,false,false,,2024-05-03T01:56:05.862Z,0 CVE-2023-27332,https://securityvulnerability.io/vulnerability/CVE-2023-27332,TP-Link Archer AX21 tdpServer Logging Stack-based Buffer Overflow Remote Code Execution Vulnerability,"A vulnerability affecting the TP-Link Archer AX21 router exists within the tdpServer logging functionality, which is prone to a stack-based buffer overflow due to inadequate length validation of user-supplied data. This flaw allows network-adjacent attackers to gain unauthorized remote access and execute arbitrary code within the root context. The tdpServer process listens on UDP port 20002, exposing this critical weakness to exploitation without any authentication requirements, making devices particularly vulnerable.",Tp-link,Archer Ax21,8.8,HIGH,0.0009299999801442027,false,,false,false,false,,,false,false,,2024-05-03T01:55:55.415Z,0 CVE-2023-49074,https://securityvulnerability.io/vulnerability/CVE-2023-49074,Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point Vulnerable to Denial of Service Attack,"A denial of service vulnerability has been identified in the TDDP functionality of the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point. This flaw allows an attacker to send a sequence of specially crafted network requests that can trigger a factory reset of the affected device. As a result, unauthorized access and disruption of services may occur, leading to significant impacts on network operations. Proper measures should be taken to mitigate this risk and ensure the security of network environments.",Tp-link,Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),7.4,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-04-09T14:12:48.559Z,0 CVE-2023-49134,https://securityvulnerability.io/vulnerability/CVE-2023-49134,Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3) Vulnerable to Command Execution via Network Requests,"A command execution vulnerability is present in the tddpd enable_test_mode functionality of specific versions of Tp-Link wireless access points, specifically the AC1350 and N300 models. Attackers may exploit this vulnerability by sending specially crafted network requests, potentially leading to arbitrary command execution on the affected devices. The N300 Wireless Gigabit Access Point version 5.0.4 is particularly vulnerable, where an attacker can send unauthenticated packets to trigger this flaw, impacting the `uclited` service. Ensuring timely updates and proper network security measures is crucial to mitigate risks associated with this vulnerability.",Tp-link,"Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),N300 Wireless Access Point (eap115)",8.1,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-04-09T14:12:48.096Z,0 CVE-2023-49133,https://securityvulnerability.io/vulnerability/CVE-2023-49133,Arbitrary Command Execution Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3),"A command execution vulnerability exists within the 'enable_test_mode' functionality of Tp-Link's AC1350 and N300 Wireless Access Points. This flaw can be exploited by sending a carefully crafted series of unauthenticated network requests, potentially leading to the execution of arbitrary commands on the affected devices. The vulnerability is associated with the `uclited` component on the EAP225 V3 model, indicating significant implications for device security if exploited. Network administrators are advised to apply the necessary updates or mitigations to safeguard their systems.",Tp-link,"Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),N300 Wireless Access Point (eap115)",8.1,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-04-09T14:12:47.975Z,0 CVE-2023-48724,https://securityvulnerability.io/vulnerability/CVE-2023-48724,Memory Corruption Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point,"A memory corruption issue exists within the web interface of the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point, specifically affecting the EAP225 V3 version 5.1.0 Build 20220926. Attackers can exploit this vulnerability by sending specially crafted HTTP POST requests, which may lead to a denial of service of the device's web interface. This can permit unauthorized interruption of normal web service functions, emphasizing the need for prompt updates and mitigations to secure affected installations.",Tp-link,Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),7.5,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2024-04-09T14:12:47.393Z,0 CVE-2023-49913,https://securityvulnerability.io/vulnerability/CVE-2023-49913,Buffer Overflow Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3),"A stack-based buffer overflow vulnerability in the web interface's Radio Scheduling functionality of the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point has been identified. An attacker with valid authentication can exploit this vulnerability by sending a specially crafted series of HTTP requests, which may lead to remote code execution. The overflow occurs specifically in the `action` parameter at offset `0x422448` within the `httpd` binary bundled with certain versions of the device. The affected versions include EAP225 V3 v5.1.0 Build 20220926 and EAP115 v5.0.4 Build 20220216.",Tp-link,"Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),N300 Wireless Access Point (eap115)",7.2,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2024-04-09T14:12:46.790Z,0 CVE-2023-49912,https://securityvulnerability.io/vulnerability/CVE-2023-49912,Buffer Overflow Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3),"A stack-based buffer overflow vulnerability has been identified in the web interface of the Radio Scheduling function in the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point. This vulnerability arises when an attacker sends specially crafted HTTP requests, leading to the potential for remote code execution. The vulnerability specifically targets the `profile` parameter in the `httpd` binary, with its overflow occurring at offset `0x4224b0`. It is critical for users of the affected versions to implement security measures promptly to mitigate risks associated with this exploit. For more information, refer to the detailed report provided by Talos Intelligence.",Tp-link,"Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),N300 Wireless Access Point (eap115)",7.2,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2024-04-09T14:12:46.695Z,0 CVE-2023-49911,https://securityvulnerability.io/vulnerability/CVE-2023-49911,Buffer Overflow Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3),"A stack-based buffer overflow vulnerability affects the web interface's Radio Scheduling feature of the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point. This vulnerability allows an attacker to send specially crafted HTTP requests that exploit the system, leading to potential remote code execution. The specific overflow occurs via the 'band' parameter in the 'httpd' binary of the device. An attacker must be authenticated to trigger this vulnerability, which exploits the software version of EAP225 V3 and the EAP115. Proper mitigation measures are essential for securing affected devices.",Tp-link,"Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),N300 Wireless Access Point (eap115)",7.2,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2024-04-09T14:12:46.602Z,0 CVE-2023-49910,https://securityvulnerability.io/vulnerability/CVE-2023-49910,Buffer Overflow Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3),"A stack-based buffer overflow vulnerability is present in the Radio Scheduling functionality of Tp-Link's AC1350 Wireless MU-MIMO Gigabit Access Point. This vulnerability can be exploited through specially crafted HTTP requests that an authenticated attacker can send to the device. The overflow occurs via the `ssid` parameter within the `httpd` binary, which is part of specific firmware versions. If successfully exploited, this vulnerability allows for remote code execution, potentially allowing attackers to compromise the affected system.",Tp-link,"Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),N300 Wireless Access Point (eap115)",7.2,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2024-04-09T14:12:46.510Z,0 CVE-2023-49909,https://securityvulnerability.io/vulnerability/CVE-2023-49909,Buffer Overflow Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3),"A stack-based buffer overflow vulnerability affects the Radio Scheduling feature of the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (specifically EAP225 V3 v5.1.0 Build 20220926). This vulnerability allows an attacker to exploit a specially crafted series of HTTP requests to achieve remote code execution. The overflow occurs due to improper handling of the `action` parameter in the `httpd_portal` binary, particularly at offset `0x0045ab38`. Successful exploitation requires authenticated access, posing significant risks if exploited maliciously.",Tp-link,"Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),N300 Wireless Access Point (eap115)",7.2,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2024-04-09T14:12:46.395Z,0 CVE-2023-49908,https://securityvulnerability.io/vulnerability/CVE-2023-49908,Buffer Overflow Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3),"A stack-based buffer overflow vulnerability is present in the Radio Scheduling feature of the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point. This vulnerability allows attackers to exploit the `profile` parameter through a series of specially crafted HTTP requests, leading to the potential execution of arbitrary code. The issue arises specifically in the `httpd_portal` binary associated with version v5.1.0 Build 20220926 of the EAP225. An authenticated attacker can manipulate this vulnerability to gain unauthorized control over the affected system, highlighting the need for immediate attention and patching.",Tp-link,"Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),N300 Wireless Access Point (eap115)",7.2,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2024-04-09T14:12:46.306Z,0 CVE-2023-49907,https://securityvulnerability.io/vulnerability/CVE-2023-49907,Buffer Overflow Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3),"A stack-based buffer overflow vulnerability has been identified in the Radio Scheduling functionality of the web interface for Tp-Link's AC1350 Wireless MU-MIMO Gigabit Access Point, specifically the EAP225 V3 model running v5.1.0 Build 20220926. This vulnerability can be exploited by sending a specially crafted series of HTTP requests, potentially allowing an attacker to execute arbitrary code remotely. The overflow is triggered through the `band` parameter located at offset `0x0045aad8` within the `httpd_portal` binary included in the affected firmware. This security flaw emphasizes the need for users to ensure their devices are updated and configured securely.",Tp-link,"Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),N300 Wireless Access Point (eap115)",7.2,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2024-04-09T14:12:46.207Z,0 CVE-2023-49906,https://securityvulnerability.io/vulnerability/CVE-2023-49906,Buffer Overflow Vulnerability in Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point (EAP225 V3),"A stack-based buffer overflow vulnerability is present in the web interface's Radio Scheduling feature of the Tp-Link AC1350 Wireless MU-MIMO Gigabit Access Point. Specifically, this vulnerability affects the EAP225 V3, version v5.1.0 Build 20220926. By sending a specially crafted series of HTTP requests that exploit the overflow in the `ssid` parameter, an attacker can achieve remote code execution. This flaw allows unauthorized control over the device by making authenticated HTTP requests that manipulate the `httpd_portal` binary at a specific offset. Immediate attention to this vulnerability is essential to protect against potential exploitation.",Tp-link,"Ac1350 Wireless Mu-mimo Gigabit Access Point (eap225 V3),N300 Wireless Access Point (eap115)",7.2,HIGH,0.0006099999882280827,false,,false,false,false,,,false,false,,2024-04-09T14:12:46.099Z,0