
CVE-2013-4848
https://notcve.org/view.php?id=CVE-2013-4848
25 Oct 2019 — TP-Link TL-WDR4300 version 3.13.31 has multiple CSRF vulnerabilities. TP-Link TL-WDR4300 versión 3.13.31, presenta múltiples vulnerabilidades de tipo CSRF. • https://vuldb.com/?id.10495 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2019-13653
https://notcve.org/view.php?id=CVE-2019-13653
24 Oct 2019 — TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow triggerPort OS Command Injection (issue 5 of 5). Los dispositivos TP-Link M7350 versiones hasta 1.0.16 Build 181220 Rel.1116n, permiten una inyección de comandos del Sistema Operativo de triggerPort (problema 5 de 5). • https://pastebin.com/yAxBFe05 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-13652
https://notcve.org/view.php?id=CVE-2019-13652
24 Oct 2019 — TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow serviceName OS Command Injection (issue 4 of 5). Los dispositivos TP-Link M7350 versiones hasta 1.0.16 Build 181220 Rel.1116n, permiten una inyección de comandos del Sistema Operativo de serviceName (problema 4 de 5). • https://pastebin.com/yAxBFe05 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-13651
https://notcve.org/view.php?id=CVE-2019-13651
24 Oct 2019 — TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow portMappingProtocol OS Command Injection (issue 3 of 5). Los dispositivos TP-Link M7350 versiones hasta 1.0.16 Build 181220 Rel.1116n, permiten una inyección de comandos del Sistema Operativo de portMappingProtocol (problema 3 de 5). • https://pastebin.com/yAxBFe05 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-13650
https://notcve.org/view.php?id=CVE-2019-13650
24 Oct 2019 — TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow internalPort OS Command Injection (issue 2 of 5). Los dispositivos TP-Link M7350 versiones hasta 1.0.16 Build 181220 Rel.1116n, permiten una Inyección de Comandos del Sistema Operativo de InternalPort (problema 2 de 5). • https://pastebin.com/yAxBFe05 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-13649
https://notcve.org/view.php?id=CVE-2019-13649
24 Oct 2019 — TP-Link M7350 devices through 1.0.16 Build 181220 Rel.1116n allow externalPort OS Command Injection (issue 1 of 5). Los dispositivos TP-Link M7350 versiones hasta 1.0.16 Build 181220 Rel.1116n, permiten una Inyección de Comandos del Sistema Operativo de externalPort (problema 1 de 5). • https://pastebin.com/yAxBFe05 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2019-13266
https://notcve.org/view.php?id=CVE-2019-13266
27 Aug 2019 — TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. A DHCP Request is sent to the router with a certain Transaction ID field. Following the DHCP protocol, the router responds with an ACK or NAK message. Studying the NAK case revealed that the router erroneously sends the NAK to both Host and Guest networks with the same Transaction ID as found in the DHCP Request. This allows encoding of d... • https://orenlab.sise.bgu.ac.il/publications/CrossRouter • CWE-669: Incorrect Resource Transfer Between Spheres •

CVE-2019-13267
https://notcve.org/view.php?id=CVE-2019-13267
27 Aug 2019 — TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. In order to transfer data from the host network to the guest network, the sender joins and then leaves an IGMP group. After it leaves, the router (following the IGMP protocol) creates an IGMP Membership Query packet with the Group IP and sends it to both the Host and the Guest networks. The data is transferred within the Group IP field, w... • https://orenlab.sise.bgu.ac.il/publications/CrossRouter •

CVE-2019-13268
https://notcve.org/view.php?id=CVE-2019-13268
27 Aug 2019 — TP-Link Archer C3200 V1 and Archer C2 V1 devices have Insufficient Compartmentalization between a host network and a guest network that are established by the same device. They forward ARP requests, which are sent as broadcast packets, between the host and the guest networks. To use this leakage as a direct covert channel, the sender can trivially issue an ARP request to an arbitrary computer on the network. (In general, some routers restrict ARP forwarding only to requests destined for the network's subnet... • https://orenlab.sise.bgu.ac.il/publications/CrossRouter • CWE-20: Improper Input Validation •

CVE-2019-15060
https://notcve.org/view.php?id=CVE-2019-15060
22 Aug 2019 — The traceroute function on the TP-Link TL-WR840N v4 router with firmware through 0.9.1 3.16 is vulnerable to remote code execution via a crafted payload in an IP address input field. La función traceroute en el enrutador TP-Link TL-WR840N versión v4 con firmware hasta 0.9.1 3.16, es vulnerable a la ejecución de código remota por medio de una carga útil especialmente diseñada en un campo de entrada de dirección IP. • https://twitter.com/rapt00rvf • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •