cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-46430,https://securityvulnerability.io/vulnerability/CVE-2022-46430,Arbitrary Code Execution and DoS Vulnerability in TP-Link Routers,"The TP-Link TL-WR740N models V1 and V2, versions 3.12.4 and earlier, are susceptible to a vulnerability that allows authenticated attackers to upload a malicious firmware image during the firmware update process. This can lead to arbitrary code execution or a Denial of Service (DoS), severely compromising device functionality and security. Users are advised to apply the latest firmware updates provided by TP-Link to mitigate this risk.",Tp-link,Tl-wr740n V1 Firmware,4.8,MEDIUM,0.0007999999797903001,false,,false,false,false,,,false,false,,2022-12-20T00:00:00.000Z,0 CVE-2022-4296,https://securityvulnerability.io/vulnerability/CVE-2022-4296,TP-Link TL-WR740N ARP resource consumption,A vulnerability classified as problematic has been found in TP-Link TL-WR740N. Affected is an unknown function of the component ARP Handler. The manipulation leads to resource consumption. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214812.,Tp-link,Tl-wr740n,6.5,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2022-12-06T00:00:00.000Z,0 CVE-2020-14965,https://securityvulnerability.io/vulnerability/CVE-2020-14965,HTML Injection Vulnerability in TP-Link TL-WR740N and TL-WR740ND Devices,"The TP-Link TL-WR740N v4 and TL-WR740ND v4 devices are susceptible to an HTML injection vulnerability that allows attackers with access to the admin panel to inject malicious HTML code. This can alter the HTML content of the target pages and modify access-control settings through 'targets_lists_name' or 'hosts_lists_name'. Furthermore, the flaw can be exploited via Cross-Site Request Forgery (CSRF), meaning even unauthenticated users can execute the injection without needing admin privileges.",Tp-link,Tl-wr740n Firmware,4.8,MEDIUM,0.0007099999929778278,false,,false,false,true,2020-06-23T01:23:26.000Z,true,false,false,,2020-06-23T13:30:13.000Z,0 CVE-2014-9350,https://securityvulnerability.io/vulnerability/CVE-2014-9350,,"TP-Link TL-WR740N 4 with firmware 3.17.0 Build 140520, 3.16.6 Build 130529, and 3.16.4 Build 130205 allows remote attackers to cause a denial of service (httpd crash) via vectors involving a ""new"" value in the isNew parameter to PingIframeRpm.htm.",Tp-link,"Tl-wr740n Firmware,Tl-wr740n",,,0.5715500116348267,false,,false,false,false,,,false,false,,2014-12-08T16:00:00.000Z,0