cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2022-46430,https://securityvulnerability.io/vulnerability/CVE-2022-46430,,TP-Link TL-WR740N V1 and V2 v3.12.4 and earlier allows authenticated attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image during the firmware update process.,Tp-link,Tl-wr740n V1 Firmware,4.8,MEDIUM,0.0007999999797903001,false,false,false,false,,false,false,2022-12-20T00:00:00.000Z,0 CVE-2020-14965,https://securityvulnerability.io/vulnerability/CVE-2020-14965,,"On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.",Tp-link,Tl-wr740n Firmware,4.8,MEDIUM,0.0007099999929778278,false,false,false,true,true,false,false,2020-06-23T13:30:13.000Z,0 CVE-2014-9350,https://securityvulnerability.io/vulnerability/CVE-2014-9350,,"TP-Link TL-WR740N 4 with firmware 3.17.0 Build 140520, 3.16.6 Build 130529, and 3.16.4 Build 130205 allows remote attackers to cause a denial of service (httpd crash) via vectors involving a ""new"" value in the isNew parameter to PingIframeRpm.htm.",Tp-link,"Tl-wr740n Firmware,Tl-wr740n",,,0.5715500116348267,false,false,false,false,,false,false,2014-12-08T16:00:00.000Z,0