cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-36489,https://securityvulnerability.io/vulnerability/CVE-2023-36489,Command Execution Vulnerability in TP-LINK Routers and Access Points,"Multiple TP-LINK router and access point models are susceptible to a command execution vulnerability that allows unauthenticated attackers on the same network to run arbitrary operating system commands. This flaw can lead to unauthorized access and potential compromise of the device’s integrity. Users are strongly advised to update their firmware to specific versions that address this vulnerability, ensuring enhanced security for their network devices.",Tp-link,"Tl-wr802n,Tl-wr841n,Tl-wr902ac",8.8,HIGH,0.0011399999493733048,false,false,false,false,,false,false,2023-09-06T10:15:00.000Z,0 CVE-2021-4144,https://securityvulnerability.io/vulnerability/CVE-2021-4144,,"TP-Link wifi router TL-WR802N V4(JP), with firmware version prior to 211202, is vulnerable to OS command injection.",Tp-link,Tl-wr802n V4(jp),8.8,HIGH,0.0013099999632686377,false,false,false,false,,false,false,2021-12-23T06:30:10.000Z,0 CVE-2021-29302,https://securityvulnerability.io/vulnerability/CVE-2021-29302,,"TP-Link TL-WR802N(US), Archer_C50v5_US v4_200 <= 2020.06 contains a buffer overflow vulnerability in the httpd process in the body message. The attack vector is: The attacker can get shell of the router by sending a message through the network, which may lead to remote code execution.",Tp-link,Tl-wr802n Firmware,8.1,HIGH,0.064970001578331,false,false,false,false,,false,false,2021-04-12T17:47:02.000Z,0