U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
  • Results Type: Overview
  • Search Type: Search All
  • CPE Name Search: false
  • CPE Vendor: cpe:/:tp-link
  • Ordered By: Publish Date Descending
There are 348 matching records.
Displaying matches 21 through 40.
Vuln ID Summary CVSS Severity
CVE-2023-46535

TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function getResetVeriRegister.

Published: October 25, 2023; 2:17:38 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-46534

TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function modifyAccPwdRegister.

Published: October 25, 2023; 2:17:38 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-46527

TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function bindRequestHandle.

Published: October 25, 2023; 2:17:38 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-46526

TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function resetCloudPwdRegister.

Published: October 25, 2023; 2:17:38 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-46525

TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function loginRegister.

Published: October 25, 2023; 2:17:38 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-46523

TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function upgradeInfoRegister.

Published: October 25, 2023; 2:17:38 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-46522

TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function deviceInfoRegister.

Published: October 25, 2023; 2:17:38 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-46521

TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function RegisterRegister.

Published: October 25, 2023; 2:17:38 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-46520

TP-LINK TL-WR886N V7.0_3.0.14_Build_221115_Rel.56908n.bin was discovered to contain a stack overflow via the function uninstallPluginReqHandle.

Published: October 25, 2023; 2:17:38 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-46373

TP-Link TL-WDR7660 2.0.30 has a stack overflow vulnerability via the function deviceInfoJsonToBincauses.

Published: October 25, 2023; 2:17:37 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-46371

TP-Link device TL-WDR7660 2.0.30 has a stack overflow vulnerability via the function upgradeInfoJsonToBin.

Published: October 25, 2023; 2:17:37 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-42189

Insecure Permissions vulnerability in Connectivity Standards Alliance Matter Official SDK v.1.1.0.0 , Nanoleaf Light strip v.3.5.10, Govee LED Strip v.3.00.42, switchBot Hub2 v.1.0-0.8, Phillips hue hub v.1.59.1959097030, and yeelight smart lamp v.1.12.69 allows a remote attacker to cause a denial of service via a crafted script to the KeySetRemove function.

Published: October 09, 2023; 11:15:09 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-38907

An issue in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 allows a remote attacker to obtain sensitive information via session key in the message function.

Published: September 25, 2023; 7:15:09 PM -0400
V3.1: 7.5 HIGH
V2.0:(not available)
CVE-2023-43135

There is an unauthorized access vulnerability in TP-LINK ER5120G 4.0 2.0.0 Build 210817 Rel.80868n, which allows attackers to obtain sensitive information of the device without authentication, obtain user tokens, and ultimately log in to the device backend management.

Published: September 20, 2023; 6:15:13 PM -0400
V3.1: 9.8 CRITICAL
V2.0:(not available)
CVE-2023-43138

TPLINK TL-ER5120G 4.0 2.0.0 Build 210817 Rel.80868n has a command injection vulnerability, when an attacker adds NAPT rules after authentication, and the rule name has an injection point.

Published: September 20, 2023; 4:15:12 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-43137

TPLINK TL-ER5120G 4.0 2.0.0 Build 210817 Rel.80868n has a command injection vulnerability, when an attacker adds ACL rules after authentication, and the rule name parameter has injection points.

Published: September 20, 2023; 4:15:12 PM -0400
V3.1: 8.8 HIGH
V2.0:(not available)
CVE-2023-40531

Archer AX6000 firmware versions prior to 'Archer AX6000(JP)_V1_1.3.0 Build 20221208' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.

Published: September 06, 2023; 6:15:15 AM -0400
V3.1: 8.0 HIGH
V2.0:(not available)
CVE-2023-40357

Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to 'Archer AX50(JP)_V1_230529', Archer A10 firmware versions prior to 'Archer A10(JP)_V2_230504', Archer AX10 firmware versions prior to 'Archer AX10(JP)_V1.2_230508', and Archer AX11000 firmware versions prior to 'Archer AX11000(JP)_V1_230523'.

Published: September 06, 2023; 6:15:14 AM -0400
V3.1: 8.0 HIGH
V2.0:(not available)
CVE-2023-40193

Deco M4 firmware versions prior to 'Deco M4(JP)_V2_1.5.8 Build 20230619' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.

Published: September 06, 2023; 6:15:14 AM -0400
V3.1: 8.0 HIGH
V2.0:(not available)
CVE-2023-39935

Archer C5400 firmware versions prior to 'Archer C5400(JP)_V2_230506' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.

Published: September 06, 2023; 6:15:14 AM -0400
V3.1: 8.0 HIGH
V2.0:(not available)