cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-46537,https://securityvulnerability.io/vulnerability/CVE-2023-46537,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin router firmware. This security flaw occurs in the getRegVeriRegister function, potentially allowing attackers to exploit the stack overflow for unauthorized access or control over the device. Users are advised to update their firmware to mitigate potential security risks.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46523,https://securityvulnerability.io/vulnerability/CVE-2023-46523,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin firmware. This vulnerability arises from a flaw in the function upgradeInfoRegister. An attacker could exploit this vulnerability to execute arbitrary code, posing significant risks to the device's integrity and the network it connects to. It is crucial for users to ensure their devices are updated to the latest firmware version to mitigate potential impacts.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46521,https://securityvulnerability.io/vulnerability/CVE-2023-46521,Stack Overflow in TP-LINK TL-WR886N Router V7,"The TP-LINK TL-WR886N router V7.0_3.0.14_Build_221115_Rel.56908n.bin contains a stack overflow vulnerability in the RegisterRegister function. This flaw could potentially allow unauthorized access and manipulation of the device, posing security risks to users. It is crucial for users to update their firmware to protect against these risks and maintain the integrity of their devices.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46536,https://securityvulnerability.io/vulnerability/CVE-2023-46536,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability was identified in the TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin firmware, specifically within the chkRegVeriRegister function. This flaw could allow attackers to exploit the stack memory, potentially leading to unauthorized access or disruption of the device's normal functioning. Users are advised to apply relevant security updates to safeguard their networks.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46535,https://securityvulnerability.io/vulnerability/CVE-2023-46535,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin firmware. The issue arises from the getResetVeriRegister function, allowing attackers to potentially exploit the vulnerability to execute malicious code or cause a denial of service. This highlights the importance of updating affected devices to secure models or firmware versions to mitigate such risks.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46520,https://securityvulnerability.io/vulnerability/CVE-2023-46520,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N V7.0 router, specifically in the uninstallPluginReqHandle function. Successful exploitation of this flaw may allow an attacker to execute arbitrary code, potentially compromising the device and the network it supports. It is crucial for users to update their firmware to the latest version to mitigate this risk.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46538,https://securityvulnerability.io/vulnerability/CVE-2023-46538,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N router firmware, specifically in the function chkResetVeriRegister. This issue could be exploited to compromise the device's stability, leading to potential unauthorized access and manipulation of router settings. Users are advised to evaluate their firmware versions and implement necessary security measures.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46534,https://securityvulnerability.io/vulnerability/CVE-2023-46534,Stack Overflow in TP-LINK TL-WR886N Router,"The TP-LINK TL-WR886N router is exposed to a stack overflow vulnerability within the function modifyAccPwdRegister. This flaw could allow attackers to execute arbitrary code, potentially compromising the device's integrity and leading to unauthorized access. Users are advised to update their firmware to mitigate risks and secure their network.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46527,https://securityvulnerability.io/vulnerability/CVE-2023-46527,Stack Overflow Vulnerability in TP-LINK Routers,"A stack overflow vulnerability was identified in TL-WR886N and TL-WDR7660 routers, stemming from the bindRequestHandle function. This flaw may allow attackers to exploit the system's memory handling, potentially leading to unauthorized access or further exploitation of the device. Users are advised to take precautionary measures to secure their network and apply any available patches to mitigate risks.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0009800000116229057,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46526,https://securityvulnerability.io/vulnerability/CVE-2023-46526,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N router's firmware. This issue resides within the 'resetCloudPwdRegister' function, which can be exploited to overwrite the stack memory, potentially allowing an attacker to execute arbitrary code or disrupt the device's functionality. Users are encouraged to apply any available firmware updates to mitigate this risk and enhance the security of their network devices.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46525,https://securityvulnerability.io/vulnerability/CVE-2023-46525,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,"A stack overflow vulnerability has been identified in the TP-LINK TL-WR886N router. This flaw lies in the loginRegister function, potentially allowing remote attackers to execute arbitrary code or crash the device. Users are advised to review their router firmware and apply necessary security measures to mitigate risks associated with this vulnerability.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46522,https://securityvulnerability.io/vulnerability/CVE-2023-46522,Stack Overflow Vulnerability in TP-LINK TL-WR886N and TL-WDR7660 Routers,"A stack overflow vulnerability has been identified in TP-LINK hardware, specifically within the TL-WR886N V7.0 and TL-WDR7660 routers. This issue arises in the deviceInfoRegister function, potentially allowing an attacker to exploit the vulnerability to execute arbitrary code or disrupt device functions. Users of affected firmware versions should take precautionary measures to safeguard their network devices from potential threats.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0009800000116229057,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2023-46539,https://securityvulnerability.io/vulnerability/CVE-2023-46539,Stack Overflow Vulnerability in TP-LINK TL-WR886N Router,The TP-LINK TL-WR886N router has been identified to have a stack overflow vulnerability originating from the 'registerRequestHandle' function. This flaw could potentially allow an attacker to execute arbitrary code or disrupt the normal functioning of the device. Users are advised to update their firmware to mitigate this security risk.,Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.00107999995816499,false,false,false,false,,false,false,2023-10-25T00:00:00.000Z,0 CVE-2021-44630,https://securityvulnerability.io/vulnerability/CVE-2021-44630,,"A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/modify_account_pwd feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015200000489130616,false,false,false,false,,false,false,2022-03-10T17:44:00.000Z,0 CVE-2021-44622,https://securityvulnerability.io/vulnerability/CVE-2021-44622,,A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/check_reg_verify_code function which could let a remove malicious user execute arbitrary code via a crafted post request.,Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015200000489130616,false,false,false,false,,false,false,2022-03-10T17:44:00.000Z,0 CVE-2021-44626,https://securityvulnerability.io/vulnerability/CVE-2021-44626,,"A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/get_reg_verify_code feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015200000489130616,false,false,false,false,,false,false,2022-03-10T17:44:00.000Z,0 CVE-2021-44627,https://securityvulnerability.io/vulnerability/CVE-2021-44627,,"A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/get_reset_pwd_veirfy_code feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015200000489130616,false,false,false,false,,false,false,2022-03-10T17:44:00.000Z,0 CVE-2021-44629,https://securityvulnerability.io/vulnerability/CVE-2021-44629,,"A Buffer Overflow vulnerabilitiy exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/register feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015200000489130616,false,false,false,false,,false,false,2022-03-10T17:44:00.000Z,0 CVE-2021-44631,https://securityvulnerability.io/vulnerability/CVE-2021-44631,,"A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/reset_cloud_pwd feature, which allows malicous users to execute arbitrary code on the system via a crafted post request.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015200000489130616,false,false,false,false,,false,false,2022-03-10T17:44:00.000Z,0 CVE-2021-44632,https://securityvulnerability.io/vulnerability/CVE-2021-44632,,"A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in the /cloud_config/router_post/upgrade_info feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015200000489130616,false,false,false,false,,false,false,2022-03-10T17:44:00.000Z,0 CVE-2021-44628,https://securityvulnerability.io/vulnerability/CVE-2021-44628,,"A Buffer Overflow vulnerabiltiy exists in TP-LINK WR-886N 20190826 2.3.8 in thee /cloud_config/router_post/login feature, which allows malicious users to execute arbitrary code on the system via a crafted post request.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0015200000489130616,false,false,false,false,,false,false,2022-03-10T17:44:00.000Z,0 CVE-2021-44625,https://securityvulnerability.io/vulnerability/CVE-2021-44625,,"A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 in /cloud_config/cloud_device/info interface, which allows a malicious user to executee arbitrary code on the system via a crafted post request.",Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0014199999859556556,false,false,false,false,,false,false,2022-03-10T17:44:00.000Z,0 CVE-2021-44623,https://securityvulnerability.io/vulnerability/CVE-2021-44623,,A Buffer Overflow vulnerability exists in TP-LINK WR-886N 20190826 2.3.8 via the /cloud_config/router_post/check_reset_pwd_verify_code interface.,Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.0014199999859556556,false,false,false,false,,false,false,2022-03-10T17:44:00.000Z,0 CVE-2018-19528,https://securityvulnerability.io/vulnerability/CVE-2018-19528,,TP-Link TL-WR886N 7.0 1.1.0 devices allow remote attackers to cause a denial of service (Tlb Load Exception) via crafted DNS packets to port 53/udp.,Tp-link,Tl-wr886n Firmware,9.8,CRITICAL,0.005830000154674053,false,false,false,false,,false,false,2018-11-26T02:00:00.000Z,0 CVE-2018-17011,https://securityvulnerability.io/vulnerability/CVE-2018-17011,,"An issue was discovered on TP-Link TL-WR886N 6.0 2.3.4 and TL-WR886N 7.0 1.1.0 devices. Authenticated attackers can crash router services (e.g., inetd, HTTP, DNS, and UPnP) via long JSON data for hosts_info para sun.",Tp-link,Tl-wr886n Firmware,6.5,MEDIUM,0.0008800000068731606,false,false,false,false,,false,false,2018-09-13T18:29:00.000Z,0