cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-36489,https://securityvulnerability.io/vulnerability/CVE-2023-36489,Command Execution Vulnerability in TP-LINK Routers and Access Points,"Multiple TP-LINK router and access point models are susceptible to a command execution vulnerability that allows unauthenticated attackers on the same network to run arbitrary operating system commands. This flaw can lead to unauthorized access and potential compromise of the device’s integrity. Users are strongly advised to update their firmware to specific versions that address this vulnerability, ensuring enhanced security for their network devices.",Tp-link,"Tl-wr802n,Tl-wr841n,Tl-wr902ac",8.8,HIGH,0.0012600000482052565,false,,false,false,false,,,false,false,,2023-09-06T10:15:00.000Z,0 CVE-2021-4144,https://securityvulnerability.io/vulnerability/CVE-2021-4144,OS Command Injection Vulnerability in TP-Link TL-WR802N Router,"A vulnerability exists in the TP-Link TL-WR802N V4(JP) router, allowing for OS command injection via specially crafted requests. This issue affects devices running firmware versions prior to 211202. The exploitation of this vulnerability can lead to unauthorized access and execution of commands on the underlying operating system. Users are advised to upgrade their firmware promptly to mitigate any potential security risks.",Tp-link,Tl-wr802n V4(jp),8.8,HIGH,0.0013099999632686377,false,,false,false,false,,,false,false,,2021-12-23T06:30:10.000Z,0 CVE-2021-29302,https://securityvulnerability.io/vulnerability/CVE-2021-29302,Buffer Overflow Vulnerability in TP-Link Router Firmware,"The TP-Link TL-WR802N and Archer_C50v5 routers are susceptible to a buffer overflow vulnerability in the httpd process. Attackers can exploit this vulnerability by sending specially crafted messages over the network, which may allow them to gain shell access to the router, ultimately leading to remote code execution. It is crucial for users of these models to apply the necessary firmware updates to secure their devices against potential threats.",Tp-link,Tl-wr802n Firmware,8.1,HIGH,0.064970001578331,false,,false,false,false,,,false,false,,2021-04-12T17:47:02.000Z,0