cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-46428,https://securityvulnerability.io/vulnerability/CVE-2022-46428,Code Execution and Denial of Service Vulnerability in TP-Link Router,"A security vulnerability exists in the TP-Link TL-WR1043ND router, where authenticated attackers can exploit the device by uploading a specially crafted firmware image during the firmware update process. This flaw enables the execution of arbitrary code or a denial of service, compromising the device's integrity and availability. Users of affected versions should apply necessary updates to safeguard their networks.",Tp-link,Tl-wr1043nd V1 Firmware,4.8,MEDIUM,0.0007999999797903001,false,,false,false,false,,,false,false,,2022-12-20T00:00:00.000Z,0 CVE-2013-2646,https://securityvulnerability.io/vulnerability/CVE-2013-2646,Denial of Service Vulnerability in TP-LINK TL-WR1043ND Router,"The TP-LINK TL-WR1043ND V1_120405 devices are susceptible to a denial of service attack that can disrupt network connectivity. This vulnerability allows attackers to potentially exhaust network resources, rendering the device unresponsive. It's crucial for users to implement protective measures to ensure network integrity and performance.",Tp-link,Tl-wr1043nd Firmware,7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2020-02-03T16:33:02.000Z,0 CVE-2018-16119,https://securityvulnerability.io/vulnerability/CVE-2018-16119,Stack-based Buffer Overflow in TP-Link WR1043nd Firmware,"A stack-based buffer overflow vulnerability exists in the HTTP server of TP-Link WR1043nd, specifically in Firmware Version 3. This flaw enables remote attackers to execute arbitrary code by sending specifically crafted MediaServer requests to the affected device. Exploitation of this vulnerability can lead to unauthorized access and control over the device, compromising its integrity and potentially jeopardizing network security.",Tp-link,Tl-wr1043nd Firmware,7.2,HIGH,0.0051299999468028545,false,,false,false,true,2018-10-19T08:50:52.000Z,true,false,false,,2019-06-20T15:51:45.000Z,0 CVE-2019-6972,https://securityvulnerability.io/vulnerability/CVE-2019-6972,Security Flaw in TP-Link TL-WR1043ND V2 Devices Makes Credentials Vulnerable,"A vulnerability exists in TP-Link TL-WR1043ND V2 devices that allows attackers to decode and crack sensitive credentials easily. The issue stems from the encoding of credentials in the 'Authorization' cookie using URL encoding followed by Base64 encoding. This flawed approach permits attackers to utilize brute-force, WordList, or Rainbow Table attacks effectively. Notably, usernames are stored in cleartext, while passwords are hashed using the outdated MD5 algorithm, making them highly susceptible to compromise. Implementing stronger encryption and enhancing password management practices are essential to mitigate this risk.",Tp-link,Tl-wr1043nd Firmware,7.5,HIGH,0.004889999981969595,false,,false,false,false,,,false,false,,2019-06-19T14:06:34.000Z,0 CVE-2019-6971,https://securityvulnerability.io/vulnerability/CVE-2019-6971,HTTP Authentication Vulnerability in TP-Link Routers,"A serious vulnerability exists in TP-Link TL-WR1043ND V2 devices that allows attackers to exploit the HTTP authentication mechanism. By sending a crafted cookie within an HTTP authentication packet to the router's management web interface, an attacker gains unauthorized control over the device without needing the actual credentials. This poses significant security risks as it enables potential manipulation and misuse of the router's configuration, impacting the overall network integrity.",Tp-link,Tl-wr1043nd Firmware,9.8,CRITICAL,0.028550000861287117,false,,false,false,false,,,false,false,,2019-06-19T14:05:03.000Z,0