Page 10 of 331 results (0.007 seconds)

CVSS: 8.0EPSS: 0%CPEs: 2EXPL: 0

Archer AX6000 firmware versions prior to 'Archer AX6000(JP)_V1_1.3.0 Build 20221208' allows a network-adjacent authenticated attacker to execute arbitrary OS commands. Las versiones de firmware de Archer AX6000 anteriores a 'Archer AX6000(JP)_V1_1.3.0 Build 20221208' permiten a un atacante autenticado adyacente a la red ejecutar comandos arbitrarios del sistema operativo. • https://jvn.jp/en/vu/JVNVU99392903 https://www.tp-link.com/jp/support/download/archer-ax6000/v1/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the TSKEP authentication function. Un problema en TPLink Smart bulb Tapo series L530 v.1.0.0 y la aplicación Tapo v.2.8.14 permite a un atacante remoto obtener información confidencial a través de la función de autenticación TSKEP. • https://arxiv.org/abs/2308.09019 https://arxiv.org/pdf/2308.09019.pdf https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold https://www.scitepress.org/Papers/2023/120929/120929.pdf https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 1

An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function. un problema en TPLink Smart bulb Tapo series L530 v.1.0.0 y Tapo Application v.2.8.14 permite a un atacante remoto obtener información sensible a través del componente IV en la función AES128-CBC. • https://arxiv.org/abs/2308.09019 https://arxiv.org/pdf/2308.09019.pdf https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold https://www.scitepress.org/Papers/2023/120929/120929.pdf https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

An issue in the component /userRpm/NetworkCfgRpm of TP-Link TL-WR1041N V2 allows attackers to cause a Denial of Service (DoS) via a crafted GET request. • https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/19/TL_WR1041N_NetworkCfgRpm_denial_of_service_vulnerability.md •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 1

TP-Link TL-WR940N V2, TP-Link TL-WR941ND V5 and TP-Link TL-WR841N V8 were discovered to contain a buffer overflow via the component /userRpm/AccessCtrlAccessRulesRpm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request. • https://github.com/a101e-IoTvul/iotvul/blob/main/tp-link/16/TP-Link%20WR940N%20WR941ND%20WR841N%20wireless%20router%20userRpmAccessCtrlAccessRulesRpm%20buffer%20read%20out-of-bounds%20vulnerability.md • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •