
CVE-2020-5795
https://notcve.org/view.php?id=CVE-2020-5795
06 Nov 2020 — UNIX Symbolic Link (Symlink) Following in TP-Link Archer A7(US)_V5_200721 allows an authenticated admin user, with physical access and network access, to execute arbitrary code after plugging a crafted USB drive into the router. Un Seguimiento de Enlace Simbólico (Symlink) de UNIX en TP-Link Archer A7(US)_V5_200721, ??permite a un usuario administrador autenticado, con acceso físico y acceso de red, ejecutar código arbitrario después de conectar una unidad USB diseñada al enrutador • https://www.tenable.com/security/research/tra-2020-60 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2020-24363 – TP-Link TL-WA855RE V5_200415 - Device Reset Auth Bypass
https://notcve.org/view.php?id=CVE-2020-24363
31 Aug 2020 — TP-Link TL-WA855RE V5 20200415-rel37464 devices allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password. Los dispositivos TP-Link TL-WA855RE versión V5 20200415-rel37464, permiten a un atacante no autenticado (en la misma red) enviar una petición POST TDDP_RESET para un restablecimiento de fábrica y reinicio. El atacante puede entonces obtener un ... • https://www.exploit-db.com/exploits/49092 • CWE-306: Missing Authentication for Critical Function •

CVE-2020-15057
https://notcve.org/view.php?id=CVE-2020-15057
07 Aug 2020 — TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to denial-of-service the device via long input values. Los dispositivos TP-Link USB Network Server TL-PS310U versiones anteriores a 2.079.000.t0210, permiten a un atacante en la misma red denegar el servicio del dispositivo por medio de valores de entrada grandes • https://research.hisolutions.com/2020/05/critical-vulnerabilites-in-multiple-usb-network-servers • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2020-15056
https://notcve.org/view.php?id=CVE-2020-15056
07 Aug 2020 — TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to conduct persistent XSS attacks by leveraging administrative privileges to set a crafted server name. Los dispositivos TP-Link USB Network Server TL-PS310U versiones anteriores a 2.079.000.t0210, permiten a un atacante en la misma red conducir ataques de tipo XSS persistentes al aprovechar los privilegios administrativos para establecer un nombre de servidor diseñado • https://research.hisolutions.com/2020/05/critical-vulnerabilites-in-multiple-usb-network-servers • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-15055
https://notcve.org/view.php?id=CVE-2020-15055
07 Aug 2020 — TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to bypass authentication via a web-administration request that lacks a password parameter. Los dispositivos TP-Link USB Network Server TL-PS310U versiones anteriores a 2.079.000.t0210, permiten a un atacante en la misma red omitir la autenticación por medio de una petición de administración web que carece de un parámetro de contraseña • https://research.hisolutions.com/2020/05/critical-vulnerabilites-in-multiple-usb-network-servers • CWE-287: Improper Authentication •

CVE-2020-15054
https://notcve.org/view.php?id=CVE-2020-15054
07 Aug 2020 — TP-Link USB Network Server TL-PS310U devices before 2.079.000.t0210 allow an attacker on the same network to elevate privileges because the administrative password can be discovered by sniffing unencrypted UDP traffic. Los dispositivos TP-Link USB Network Server TL-PS310U versiones anteriores a 2.079.000.t0210, permiten a un atacante en la misma red elevar los privilegios porque la contraseña administrativa puede ser detectada mediante el rastreo del tráfico UDP no cifrado • https://research.hisolutions.com/2020/05/critical-vulnerabilites-in-multiple-usb-network-servers • CWE-319: Cleartext Transmission of Sensitive Information CWE-522: Insufficiently Protected Credentials •

CVE-2020-14965
https://notcve.org/view.php?id=CVE-2020-14965
23 Jun 2020 — On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator. En los dispositivos TP-Link TL-WR740N versión v4 y TL-WR740ND versión v4, un atacante con acceso al panel de administración puede inyectar código HTML y cam... • https://github.com/g-rubert/CVE-2020-14965 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-13224 – TP-LINK Cloud Cameras NCXXX Stack Overflow
https://notcve.org/view.php?id=CVE-2020-13224
16 Jun 2020 — TP-LINK NC200 devices through 2.1.10 build 200401, NC210 devices through 1.0.10 build 200401, NC220 devices through 1.3.1 build 200401, NC230 devices through 1.3.1 build 200401, NC250 devices through 1.3.1 build 200401, NC260 devices through 1.5.3 build_200401, and NC450 devices through 1.5.4 build 200401 have a Buffer Overflow Dispositivos TP-LINK NC200 versiones hasta 2.1.10 build 200401, dispositivos NC210 versiones hasta 1.0.10 build 200401, dispositivos NC220 versiones hasta 1.3.1 build 200401, disposi... • https://packetstorm.news/files/id/158115 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2020-12110 – TP-LINK Cloud Cameras NCXXX Hardcoded Encryption Key
https://notcve.org/view.php?id=CVE-2020-12110
01 May 2020 — Certain TP-Link devices have a Hardcoded Encryption Key. This affects NC200 2.1.9 build 200225, N210 1.0.9 build 200304, NC220 1.3.0 build 200304, NC230 1.3.0 build 200304, NC250 1.3.0 build 200304, NC260 1.5.2 build 200304, and NC450 1.5.3 build 200304. Determinados dispositivos TP-Link tienen una Clave de Cifrado Embebida. Esto afecta a NC200 versión 2.1.9 build 200225, N210 versión 1.0.9 build 200304, NC220 versión 1.3.0 build 200304, NC230 versión 1.3.0 build 200304, NC250 versión 1.3.0 build 200304, NC... • https://packetstorm.news/files/id/157532 • CWE-798: Use of Hard-coded Credentials •

CVE-2020-12109 – TP-LINK Cloud Cameras NCXXX Bonjour Command Injection
https://notcve.org/view.php?id=CVE-2020-12109
01 May 2020 — Certain TP-Link devices allow Command Injection. This affects NC200 2.1.9 build 200225, NC210 1.0.9 build 200304, NC220 1.3.0 build 200304, NC230 1.3.0 build 200304, NC250 1.3.0 build 200304, NC260 1.5.2 build 200304, and NC450 1.5.3 build 200304. Ciertos dispositivos TP-Link permiten una inyección de comandos. Esto afecta a NC200 versión 2.1.9 build 200225, NC210 versión 1.0.9 build 200304, NC220 versión 1.3.0 build 200304, NC230 versión 1.3.0 build 200304, NC250 versión 1.3.0 build 200304, NC260 versión 1... • https://packetstorm.news/files/id/157531 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •