cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-39745,https://securityvulnerability.io/vulnerability/CVE-2023-39745,Buffer Overflow Vulnerability in TP-Link Wireless Routers,"A buffer overflow vulnerability exists in TP-Link TL-WR940N V2, TL-WR941ND V5, and TL-WR841N V8 routers. This vulnerability occurs via the component /userRpm/AccessCtrlAccessRulesRpm, allowing attackers who send a specially crafted GET request to the affected devices to achieve a Denial of Service (DoS). The flaw enables potential disruption of service, affecting availability for users and posing a security risk to network environments.",Tp-link,Tl-wr940n V2 Firmware,7.5,HIGH,0.0005200000014156103,false,false,false,false,,false,false,2023-08-21T03:15:00.000Z,0 CVE-2023-39747,https://securityvulnerability.io/vulnerability/CVE-2023-39747,Buffer Overflow Vulnerability in TP-Link Wireless Routers,"A buffer overflow vulnerability has been identified in certain TP-Link wireless routers, including models WR841N V8, TL-WR940N V2, and TL-WR941ND V5. This vulnerability occurs in the 'radiusSecret' parameter on the /userRpm/WlanSecurityRpm endpoint. An attacker can exploit this flaw to potentially execute arbitrary code, leading to unauthorized access and compromises in device integrity. Users are advised to apply the latest firmware updates and enhance their network security configurations to mitigate these risks.",Tp-link,Tl-wr940n V2 Firmware,9.8,CRITICAL,0.000750000006519258,false,false,false,false,,false,false,2023-08-21T03:15:00.000Z,0