
CVE-2021-4144
https://notcve.org/view.php?id=CVE-2021-4144
23 Dec 2021 — TP-Link wifi router TL-WR802N V4(JP), with firmware version prior to 211202, is vulnerable to OS command injection. El router wifi TL-WR802N V4(JP) de TP-Link, con versión de firmware anterior a 211202, es vulnerable a una inyección de comandos del Sistema Operativo • https://jvn.jp/en/vu/JVNVU94883311 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2021-41451
https://notcve.org/view.php?id=CVE-2021-41451
17 Dec 2021 — A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated attacker to send a specially crafted HTTP request and receive a misconfigured HTTP/0.9 response, potentially leading into a cache poisoning attack. Una configuración errónea en HTTP/1.0 y HTTP/1.1 de la interfaz web en TP-Link AX10v1 antes de V1_211117 permite que un atacante remoto no autenticado envíe una solicitud HTTP especialmente diseñada y reciba una respuesta HTTP/0.9 m... • http://ax10v1.com • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVE-2021-41450
https://notcve.org/view.php?id=CVE-2021-41450
08 Dec 2021 — An HTTP request smuggling attack in TP-Link AX10v1 before v1_211117 allows a remote unauthenticated attacker to DoS the web application via sending a specific HTTP packet. Un ataque de contrabando de peticiones HTTP en TP-Link AX10v1 versiones anteriores a v1_211117, permite a un atacante remoto no autenticado hacer DoS a la aplicación web por medio del envío de un paquete HTTP específico • http://ax10v1.com • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVE-2021-40288
https://notcve.org/view.php?id=CVE-2021-40288
07 Dec 2021 — A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames Un ataque de denegación de servicio en los métodos de autenticación WPA2 y WPA3-SAE en TP-Link AX10v1 versiones anteriores a V1_211014, permite a un atacante remoto no autenticado desconectar un cliente inalámbrico ya conectado por medio... • https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware • CWE-290: Authentication Bypass by Spoofing •

CVE-2021-41653
https://notcve.org/view.php?id=CVE-2021-41653
13 Nov 2021 — The PING function on the TP-Link TL-WR840N EU v5 router with firmware through TL-WR840N(EU)_V5_171211 is vulnerable to remote code execution via a crafted payload in an IP address input field. La función PING en el router TP-Link TL-WR840N EU versión v5 con firmware hasta TL-WR840N(EU)_V5_171211, es vulnerable a una ejecución de código remota por medio de una carga útil diseñada en un campo de entrada de dirección IP • https://github.com/likeww/CVE-2021-41653 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2021-29280
https://notcve.org/view.php?id=CVE-2021-29280
19 Aug 2021 — In TP-Link Wireless N Router WR840N an ARP poisoning attack can cause buffer overflow En el router inalámbrico N WR840N de TP-Link, un ataque de envenenamiento ARP puede causar un desbordamiento del búfer. • https://github.com/deadlysnowman3308/upgraded-ARP-Poisoning • CWE-668: Exposure of Resource to Wrong Sphere •

CVE-2021-38543
https://notcve.org/view.php?id=CVE-2021-38543
11 Aug 2021 — TP-Link UE330 USB splitter devices through 2021-08-09, in certain specific use cases in which the device supplies power to audio-output equipment, allow remote attackers to recover speech signals from an LED on the device, via a telescope and an electro-optical sensor, aka a "Glowworm" attack. We assume that the USB splitter supplies power to some speakers. The power indicator LED of the USB splitter is connected directly to the power line, as a result, the intensity of the USB splitter's power indicator LE... • https://www.nassiben.com/glowworm-attack •

CVE-2021-28857
https://notcve.org/view.php?id=CVE-2021-28857
15 Jun 2021 — TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 username and password are sent via the cookie. TP-Link TL-WPA4220 Versión 4.0.2 Build 20180308 Rel.37064, un nombre de usuario y la contraseña son enviados por medio de la cookie • https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-credentials-in-cookie-7516a2649394 • CWE-522: Insufficiently Protected Credentials •

CVE-2021-28858
https://notcve.org/view.php?id=CVE-2021-28858
15 Jun 2021 — TP-Link's TL-WPA4220 4.0.2 Build 20180308 Rel.37064 does not use SSL by default. Attacker on the local network can monitor traffic and capture the cookie and other sensitive information. TP-Link TL-WPA4220 versión 4.0.2 Build 20180308 Rel.37064 no usa SSL por defecto. El atacante en la red local puede monitorear el tráfico y capturar la cookie y otra información confidencial • https://yunus-shn.medium.com/tp-links-tl-wpa4220-v4-0-cleartext-transmission-of-sensitive-information-40357c778b84 • CWE-312: Cleartext Storage of Sensitive Information •

CVE-2021-31659
https://notcve.org/view.php?id=CVE-2021-31659
10 Jun 2021 — TP-Link TL-SG2005, TL-SG2008, etc. 1.0.0 Build 20180529 Rel.40524 is vulnerable to Cross Site Request Forgery (CSRF). All configuration information is placed in the URL, without any additional token authentication information. A malicious link opened by the switch administrator may cause the password of the switch to be modified and the configuration file to be tampered with. TP-Link TL-SG2005, TL-SG2008, etc. versiones 1.0.0 Build 20180529 Rel.40524 es vulnerable a taques de tipo Cross Site Request Forgery... • http://tp-link.com • CWE-352: Cross-Site Request Forgery (CSRF) •