cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2022-46912,https://securityvulnerability.io/vulnerability/CVE-2022-46912,Arbitrary Code Execution and DoS Vulnerability in TP-Link TL-WR841N and TL-WA841ND Routers,"A significant vulnerability exists in the firmware update process of TP-Link TL-WR841N and TL-WA841ND V7 routers, affecting versions 3.13.9 and earlier. This flaw allows attackers to upload malicious firmware images, which can lead to arbitrary code execution or trigger a Denial of Service (DoS). Users of these router models are urged to review their firmware versions and consider updates to protect their networks against potential exploitation.",Tp-link,Tl-wr841n Firmware,8.8,HIGH,0.0021800000686198473,false,,false,false,false,,,false,false,,2022-12-20T00:00:00.000Z,0 CVE-2022-42202,https://securityvulnerability.io/vulnerability/CVE-2022-42202,Cross Site Scripting Vulnerability in TP-Link TL-WR841N Router,"The TP-Link TL-WR841N router version 8.0 with firmware 4.17.16 Build 120201 Rel.54750n is vulnerable to Cross Site Scripting (XSS) attacks. This vulnerability allows an attacker to inject malicious scripts into web pages viewed by users, potentially compromising the integrity of user data and session information. When exploited, it can lead to unauthorized actions being performed on behalf of users without their awareness, posing a serious threat to the security of personal and sensitive information.",Tp-link,Tl-wr841n Firmware,6.1,MEDIUM,0.0006300000241026282,false,,false,false,false,,,false,false,,2022-10-18T00:00:00.000Z,0 CVE-2022-25073,https://securityvulnerability.io/vulnerability/CVE-2022-25073,Stack Overflow Vulnerability in TP-Link Routers,"The TL-WR841Nv14_US_0.9.1_4.18 router is vulnerable to a stack overflow due to a flaw found in the function dm_fillObjByStr(). This security issue could be exploited by unauthenticated attackers to execute arbitrary code, potentially leading to unauthorized access and control over the device.",Tp-link,Tl-wr841n Firmware,9.8,CRITICAL,0.0022899999748915434,false,,false,false,false,,,false,false,,2022-02-24T15:15:00.000Z,0 CVE-2020-35576,https://securityvulnerability.io/vulnerability/CVE-2020-35576,Command Injection Vulnerability in TP-Link TL-WR841N Router,"A command injection vulnerability exists in the traceroute feature of the TP-Link TL-WR841N V13 (JP) router. This flaw allows authenticated users to exploit the device by injecting arbitrary shell metacharacters, enabling them to execute code with root privileges. This vulnerability specifically affects versions of the firmware released before 201216, differing from previous vulnerabilities like CVE-2018-12577. Users are urged to update their firmware to mitigate the risks associated with this security issue.",Tp-link,Tl-wr841n Firmware,8.8,HIGH,0.03082999959588051,false,,false,false,false,,,false,false,,2021-01-26T18:15:00.000Z,0 CVE-2020-8423,https://securityvulnerability.io/vulnerability/CVE-2020-8423,Buffer Overflow Vulnerability in TP-Link TL-WR841N V10 Firmware,"A buffer overflow vulnerability exists in the httpd daemon on TP-Link TL-WR841N V10 devices running firmware version 3.16.9. An authenticated remote attacker could exploit this issue by sending a specially crafted GET request to the Wi-Fi network configuration page. This action may allow the attacker to execute arbitrary code on the device, potentially compromising its security and functionality.",Tp-link,Tl-wr841n Firmware,7.2,HIGH,0.004209999926388264,false,,false,false,true,2022-09-20T21:13:53.000Z,true,false,false,,2020-04-02T17:00:17.000Z,0 CVE-2018-12577,https://securityvulnerability.io/vulnerability/CVE-2018-12577,,The Ping and Traceroute features on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices allow authenticated blind Command Injection.,Tp-link,Tl-wr841n Firmware,8.8,HIGH,0.001339999958872795,false,,false,false,false,,,false,false,,2018-07-02T16:00:00.000Z,0 CVE-2018-12576,https://securityvulnerability.io/vulnerability/CVE-2018-12576,,TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices allow clickjacking.,Tp-link,Tl-wr841n Firmware,4.3,MEDIUM,0.0007600000244565308,false,,false,false,false,,,false,false,,2018-07-02T16:00:00.000Z,0 CVE-2018-12574,https://securityvulnerability.io/vulnerability/CVE-2018-12574,,CSRF exists for all actions in the web interface on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices.,Tp-link,Tl-wr841n Firmware,8.8,HIGH,0.007799999788403511,false,,false,false,false,,,false,false,,2018-07-02T16:00:00.000Z,0 CVE-2018-12575,https://securityvulnerability.io/vulnerability/CVE-2018-12575,,"On TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 171019 Rel.55346n devices, all actions in the web interface are affected by bypass of authentication via an HTTP request.",Tp-link,Tl-wr841n Firmware,9.8,CRITICAL,0.01655999943614006,false,,false,false,false,,,false,false,,2018-07-02T16:00:00.000Z,0 CVE-2015-3035,https://securityvulnerability.io/vulnerability/CVE-2015-3035,,"Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.",Tp-link,Tl-wr841n \(9.0\) Firmware,7.5,HIGH,0.9432500004768372,true,2022-03-25T00:00:00.000Z,false,false,true,2022-03-25T00:00:00.000Z,,false,false,,2015-04-22T01:59:00.000Z,0 CVE-2012-6316,https://securityvulnerability.io/vulnerability/CVE-2012-6316,,Multiple cross-site scripting (XSS) vulnerabilities in the TP-LINK TL-WR841N router with firmware 3.13.9 Build 120201 Rel.54965n and earlier allow remote administrators to inject arbitrary web script or HTML via the (1) username or (2) pwd parameter to userRpm/NoipDdnsRpm.htm.,Tp-link,"Tl-wr841n Firmware,Tl-wr841n",,,0.0009500000160187483,false,,false,false,false,,,false,false,,2014-09-30T14:00:00.000Z,0 CVE-2012-6276,https://securityvulnerability.io/vulnerability/CVE-2012-6276,,Directory traversal vulnerability in the web-based management interface on the TP-LINK TL-WR841N router with firmware 3.13.9 build 120201 Rel.54965n and earlier allows remote attackers to read arbitrary files via the URL parameter.,Tp-link,"Tl-wr841n Firmware,Tl-wr841n",,,0.005679999943822622,false,,false,false,false,,,false,false,,2013-01-26T21:55:00.000Z,0 CVE-2012-5687,https://securityvulnerability.io/vulnerability/CVE-2012-5687,,Directory traversal vulnerability in the web-based management feature on the TP-LINK TL-WR841N router with firmware 3.13.9 build 120201 Rel.54965n and earlier allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to the help/ URI.,Tp-link,"Tl-wr841n,Tl-wr841n Firmware",,,0.3061099946498871,false,,false,false,false,,,false,false,,2012-11-01T10:00:00.000Z,0