cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2020-9374,https://securityvulnerability.io/vulnerability/CVE-2020-9374,Remote Command Execution Vulnerability in TP-Link TL-WR849N Router,"A vulnerability exists in the TP-Link TL-WR849N router that allows attackers to execute arbitrary commands remotely through the diagnostics interface. By sending specially crafted shell metacharacters to the traceroute feature, an attacker can gain unauthorized access and execute harmful commands, potentially compromising the device and the network it is connected to.",Tp-link,Tl-wr849n Firmware,9.8,CRITICAL,0.689079999923706,false,,false,false,false,,,false,false,,2020-02-24T18:57:52.000Z,0 CVE-2019-19143,https://securityvulnerability.io/vulnerability/CVE-2019-19143,Authentication Bypass in TP-LINK TL-WR849N Devices,"The TP-LINK TL-WR849N 0.9.1 4.16 devices are impacted by a vulnerability that allows attackers to replace the firmware without requiring authentication. By sending a crafted POST request to the cgi/softup URI, unauthorized users can exploit this loophole, leading to potential unauthorized access and control over the device. This poses significant risks to network security and integrity, making it essential for users to secure their devices against such vulnerabilities.",Tp-link,Tl-wr849n Firmware,6.1,MEDIUM,0.002689999993890524,false,,false,false,false,,,false,false,,2020-01-27T18:17:00.000Z,0