cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2020-9374,https://securityvulnerability.io/vulnerability/CVE-2020-9374,,"On TP-Link TL-WR849N 0.9.1 4.16 devices, a remote command execution vulnerability in the diagnostics area can be exploited when an attacker sends specific shell metacharacters to the panel's traceroute feature.",Tp-link,Tl-wr849n Firmware,9.8,CRITICAL,0.5934600234031677,false,false,false,false,,false,false,2020-02-24T18:57:52.000Z,0 CVE-2019-19143,https://securityvulnerability.io/vulnerability/CVE-2019-19143,,TP-LINK TL-WR849N 0.9.1 4.16 devices do not require authentication to replace the firmware via a POST request to the cgi/softup URI.,Tp-link,Tl-wr849n Firmware,6.1,MEDIUM,0.003809999907389283,false,false,false,false,,false,false,2020-01-27T18:17:00.000Z,0