cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-46538,https://securityvulnerability.io/vulnerability/CVE-2023-46538,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N router firmware, specifically in the function chkResetVeriRegister. This issue could be exploited to compromise the device's stability, leading to potential unauthorized access and manipulation of router settings. Users are advised to evaluate their firmware versions and implement necessary security measures.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46539,https://securityvulnerability.io/vulnerability/CVE-2023-46539,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,The TP-LINK TL-WR886N router has been identified to have a stack overflow vulnerability originating from the 'registerRequestHandle' function. This flaw could potentially allow an attacker to execute arbitrary code or disrupt the normal functioning of the device. Users are advised to update their firmware to mitigate this security risk.,Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46521,https://securityvulnerability.io/vulnerability/CVE-2023-46521,Stack Overflow in TP-LINK TL-WR886N Router V7,"The TP-LINK TL-WR886N router V7.0_3.0.14_Build_221115_Rel.56908n.bin contains a stack overflow vulnerability in the RegisterRegister function. This flaw could potentially allow unauthorized access and manipulation of the device, posing security risks to users. It is crucial for users to update their firmware to protect against these risks and maintain the integrity of their devices.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46522,https://securityvulnerability.io/vulnerability/CVE-2023-46522,Stack Overflow Vulnerability in TP-LINK TL-WR886N and TL-WDR7660 Routers,"A stack overflow vulnerability has been identified in TP-LINK hardware, specifically within the TL-WR886N V7.0 and TL-WDR7660 routers. This issue arises in the deviceInfoRegister function, potentially allowing an attacker to exploit the vulnerability to execute arbitrary code or disrupt device functions. Users of affected firmware versions should take precautionary measures to safeguard their network devices from potential threats.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0009800000116229057,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46520,https://securityvulnerability.io/vulnerability/CVE-2023-46520,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N V7.0 router, specifically in the uninstallPluginReqHandle function. Successful exploitation of this flaw may allow an attacker to execute arbitrary code, potentially compromising the device and the network it supports. It is crucial for users to update their firmware to the latest version to mitigate this risk.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46523,https://securityvulnerability.io/vulnerability/CVE-2023-46523,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin firmware. This vulnerability arises from a flaw in the function upgradeInfoRegister. An attacker could exploit this vulnerability to execute arbitrary code, posing significant risks to the device's integrity and the network it connects to. It is crucial for users to ensure their devices are updated to the latest firmware version to mitigate potential impacts.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46525,https://securityvulnerability.io/vulnerability/CVE-2023-46525,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N router. This flaw lies in the loginRegister function, potentially allowing remote attackers to execute arbitrary code or crash the device. Users are advised to review their router firmware and apply necessary security measures to mitigate risks associated with this vulnerability.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46526,https://securityvulnerability.io/vulnerability/CVE-2023-46526,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N router's firmware. This issue resides within the 'resetCloudPwdRegister' function, which can be exploited to overwrite the stack memory, potentially allowing an attacker to execute arbitrary code or disrupt the device's functionality. Users are encouraged to apply any available firmware updates to mitigate this risk and enhance the security of their network devices.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46527,https://securityvulnerability.io/vulnerability/CVE-2023-46527,Stack Overflow Vulnerability in TP-LINK Routers,"A stack overflow vulnerability was identified in TL-WR886N and TL-WDR7660 routers, stemming from the bindRequestHandle function. This flaw may allow attackers to exploit the system's memory handling, potentially leading to unauthorized access or further exploitation of the device. Users are advised to take precautionary measures to secure their network and apply any available patches to mitigate risks.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0009800000116229057,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46534,https://securityvulnerability.io/vulnerability/CVE-2023-46534,Stack Overflow in TP-LINK TL-WR886N Router,"The TP-LINK TL-WR886N router is exposed to a stack overflow vulnerability within the function modifyAccPwdRegister. This flaw could allow attackers to execute arbitrary code, potentially compromising the device's integrity and leading to unauthorized access. Users are advised to update their firmware to mitigate risks and secure their network.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46535,https://securityvulnerability.io/vulnerability/CVE-2023-46535,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin firmware. The issue arises from the getResetVeriRegister function, allowing attackers to potentially exploit the vulnerability to execute malicious code or cause a denial of service. This highlights the importance of updating affected devices to secure models or firmware versions to mitigate such risks.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46536,https://securityvulnerability.io/vulnerability/CVE-2023-46536,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability was identified in the TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin firmware, specifically within the chkRegVeriRegister function. This flaw could allow attackers to exploit the stack memory, potentially leading to unauthorized access or disruption of the device's normal functioning. Users are advised to apply relevant security updates to safeguard their networks.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2023-46537,https://securityvulnerability.io/vulnerability/CVE-2023-46537,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin router firmware. This security flaw occurs in the getRegVeriRegister function, potentially allowing attackers to exploit the stack overflow for unauthorized access or control over the device. Users are advised to update their firmware to mitigate potential security risks.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,,false,false,false,,,false,false,,2023-10-25T00:00:00.000Z,0 CVE-2021-44631,https://securityvulnerability.io/vulnerability/CVE-2021-44631,Buffer Overflow Vulnerability in TP-LINK WR-886N Router,"A buffer overflow vulnerability found in the TP-LINK WR-886N router, specifically in the /cloud_config/router_post/reset_cloud_pwd feature, could allow malicious actors to execute arbitrary code on the device. This vulnerability arises when the system processes crafted POST requests, potentially compromising the router's integrity and the security of connected networks. Users should ensure their devices are updated to prevent exploitation of this weakness.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015699999639764428,false,,false,false,false,,,false,false,,2022-03-10T17:44:00.000Z,0 CVE-2021-44628,https://securityvulnerability.io/vulnerability/CVE-2021-44628,Buffer Overflow Vulnerability in TP-LINK Router,"A buffer overflow vulnerability in TP-LINK WR-886N routers allows malicious users to exploit the /cloud_config/router_post/login feature. By sending specially crafted post requests, attackers can execute arbitrary code on the system, leading to potential unauthorized access and control.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015699999639764428,false,,false,false,false,,,false,false,,2022-03-10T17:44:00.000Z,0 CVE-2021-44630,https://securityvulnerability.io/vulnerability/CVE-2021-44630,Buffer Overflow in TP-LINK WR-886N Router,"A Buffer Overflow vulnerability in the TP-LINK WR-886N router version 20190826 2.3.8 allows attackers to execute arbitrary code by sending specially crafted POST requests to the '/cloud_config/router_post/modify_account_pwd' endpoint, potentially compromising system security.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015699999639764428,false,,false,false,false,,,false,false,,2022-03-10T17:44:00.000Z,0 CVE-2021-44622,https://securityvulnerability.io/vulnerability/CVE-2021-44622,Buffer Overflow Vulnerability in TP-LINK WR-886N Router,"A buffer overflow vulnerability exists in the TP-LINK WR-886N router version 20190826 2.3.8, specifically in the /cloud_config/router_post/check_reg_verify_code function. This flaw can be exploited by remote attackers through specially crafted POST requests, potentially allowing them to execute arbitrary code on the affected device.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015699999639764428,false,,false,false,false,,,false,false,,2022-03-10T17:44:00.000Z,0 CVE-2021-44623,https://securityvulnerability.io/vulnerability/CVE-2021-44623,Buffer Overflow Vulnerability in TP-LINK WR-886N Router,"A buffer overflow vulnerability has been identified in the TP-LINK WR-886N router, affecting version 20190826 2.3.8. This vulnerability is present in the /cloud_config/router_post/check_reset_pwd_verify_code interface. Exploitation may allow an attacker to execute arbitrary code, potentially compromising the router's functionality and the network it serves. Users are advised to review their security measures and consider updates or patches from the vendor.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0013800000306218863,false,,false,false,false,,,false,false,,2022-03-10T17:44:00.000Z,0 CVE-2021-44632,https://securityvulnerability.io/vulnerability/CVE-2021-44632,Buffer Overflow Vulnerability in TP-LINK Router Firmware,"A buffer overflow vulnerability in the TP-LINK WR-886N router's firmware version 20190826 2.3.8 is present in the /cloud_config/router_post/upgrade_info feature. This vulnerability enables attackers to send specially crafted post requests that may lead to arbitrary code execution on the device, potentially compromising the system's integrity and functionality.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015699999639764428,false,,false,false,false,,,false,false,,2022-03-10T17:44:00.000Z,0 CVE-2021-44629,https://securityvulnerability.io/vulnerability/CVE-2021-44629,Buffer Overflow Vulnerability in TP-LINK WR-886N Router,"A vulnerability has been identified in the TP-LINK WR-886N Router, specifically within the /cloud_config/router_post/register functionality. This vulnerability allows malicious users to exploit a buffer overflow condition, potentially leading to arbitrary code execution. This could enable attackers to gain unauthorized access and control over the system through a specially crafted post request.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015699999639764428,false,,false,false,false,,,false,false,,2022-03-10T17:44:00.000Z,0 CVE-2021-44625,https://securityvulnerability.io/vulnerability/CVE-2021-44625,Buffer Overflow Vulnerability in TP-LINK WR-886N Router,"A buffer overflow vulnerability has been identified in the TP-LINK WR-886N Router at the /cloud_config/cloud_device/info interface. This vulnerability allows an attacker to send specially crafted POST requests, which can result in arbitrary code execution on the device. Exploitation of this flaw could lead to unauthorized control over the affected system, posing significant security risks to users.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0013800000306218863,false,,false,false,false,,,false,false,,2022-03-10T17:44:00.000Z,0 CVE-2021-44626,https://securityvulnerability.io/vulnerability/CVE-2021-44626,Buffer Overflow Vulnerability in TP-LINK WR-886N Router,"A buffer overflow vulnerability has been identified in the TP-LINK WR-886N router, specifically within the /cloud_config/router_post/get_reg_verify_code function. This flaw can be exploited by attackers who craft malicious post requests, potentially allowing them to execute arbitrary code on the affected device. Such vulnerabilities pose significant risks to the security and integrity of IoT devices, making it imperative for users to apply necessary updates and protective measures.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015699999639764428,false,,false,false,false,,,false,false,,2022-03-10T17:44:00.000Z,0 CVE-2021-44627,https://securityvulnerability.io/vulnerability/CVE-2021-44627,Buffer Overflow Vulnerability in TP-LINK WR-886N Router,"A buffer overflow vulnerability has been identified in the TP-LINK WR-886N router, specifically in the /cloud_config/router_post/get_reset_pwd_verify_code function. This vulnerability can be exploited by malicious users to execute arbitrary code on the system through specially crafted POST requests, posing significant security risks to the device and its network.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015699999639764428,false,,false,false,false,,,false,false,,2022-03-10T17:44:00.000Z,0 CVE-2018-19528,https://securityvulnerability.io/vulnerability/CVE-2018-19528,,TP-Link TL-WR886N 7.0 1.1.0 devices allow remote attackers to cause a denial of service (Tlb Load Exception) via crafted DNS packets to port 53/udp.,Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.005830000154674053,false,,false,false,false,,,false,false,,2018-11-26T02:00:00.000Z,0 CVE-2018-17011,https://securityvulnerability.io/vulnerability/CVE-2018-17011,,"An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for hosts_info para sun.",Tp-link,Tl-wr886n Firmware,6.5,MEDIUM,0.0008800000068731606,false,,false,false,false,,,false,false,,2018-09-13T18:29:00.000Z,0