CVE-2023-40357
https://notcve.org/view.php?id=CVE-2023-40357
Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to 'Archer AX50(JP)_V1_230529', Archer A10 firmware versions prior to 'Archer A10(JP)_V2_230504', Archer AX10 firmware versions prior to 'Archer AX10(JP)_V1.2_230508', and Archer AX11000 firmware versions prior to 'Archer AX11000(JP)_V1_230523'. Múltiples productos TP-LINK permiten que un atacante autenticado adyacente a la red ejecute comandos arbitrarios del sistema operativo. Los productos/versiones afectados son los siguientes: Versiones de firmware de Archer AX50 anteriores a 'Archer AX50(JP)_V1_230529', Versiones de firmware de Archer A10 anteriores a 'Archer A10(JP)_V2_230504', Versiones de firmware de Archer AX10 anteriores a 'Archer AX10(JP) _V1.2_230508' y versiones de firmware de Archer AX11000 anteriores a 'Archer AX11000(JP)_V1_230523'. • https://jvn.jp/en/vu/JVNVU99392903 https://www.tp-link.com/jp/support/download/archer-a10/#Firmware https://www.tp-link.com/jp/support/download/archer-ax10/#Firmware https://www.tp-link.com/jp/support/download/archer-ax11000/#Firmware https://www.tp-link.com/jp/support/download/archer-ax50/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2023-34832
https://notcve.org/view.php?id=CVE-2023-34832
TP-Link Archer AX10(EU)_V1.2_230220 was discovered to contain a buffer overflow via the function FUN_131e8 - 0x132B4. • http://archer.com http://packetstormsecurity.com/files/172989/TP-Link-Archer-AX10-EU-_V1.2_230220-Buffer-Overflow.html http://tp-link.com https://gist.github.com/jhacker91/2026e080a42514255e758d64b465d1d5 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •
CVE-2021-41451
https://notcve.org/view.php?id=CVE-2021-41451
A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated attacker to send a specially crafted HTTP request and receive a misconfigured HTTP/0.9 response, potentially leading into a cache poisoning attack. Una configuración errónea en HTTP/1.0 y HTTP/1.1 de la interfaz web en TP-Link AX10v1 antes de V1_211117 permite que un atacante remoto no autenticado envíe una solicitud HTTP especialmente diseñada y reciba una respuesta HTTP/0.9 mal configurada, lo que podría conducir a un ataque de envenenamiento de caché • http://ax10v1.com http://tp-link.com https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •
CVE-2021-40288
https://notcve.org/view.php?id=CVE-2021-40288
A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames Un ataque de denegación de servicio en los métodos de autenticación WPA2 y WPA3-SAE en TP-Link AX10v1 versiones anteriores a V1_211014, permite a un atacante remoto no autenticado desconectar un cliente inalámbrico ya conectado por medio del envío con un adaptador inalámbrico de tramas de autenticación falsas específicas • https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware • CWE-290: Authentication Bypass by Spoofing •