Page 28 of 380 results (0.002 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 2

19 Jun 2019 — An issue was discovered on TP-Link TL-WR1043ND V2 devices. The credentials can be easily decoded and cracked by brute-force, WordList, or Rainbow Table attacks. Specifically, credentials in the "Authorization" cookie are encoded with URL encoding and base64, leading to easy decoding. Also, the username is cleartext, and the password is hashed with the MD5 algorithm (after decoding of the URL encoded string with base64). Se descubrió un problema en los dispositivos TP-Link TL-WR1043ND V2. • https://github.com/MalFuzzer/Vulnerability-Research/blob/master/TL-WR1043ND%20V2%20-%20TP-LINK/TL-WR1043ND_PoC.pdf • CWE-326: Inadequate Encryption Strength •

CVSS: 10.0EPSS: 12%CPEs: 2EXPL: 3

19 Jun 2019 — An issue was discovered on TP-Link TL-WR1043ND V2 devices. An attacker can send a cookie in an HTTP authentication packet to the router management web interface, and fully control the router without knowledge of the credentials. Se detecto un problema en los dispositivos TP-Link TL-WR1043ND V2. Un atacante puede enviar una cookie en un paquete de autenticación HTTP a la interfaz web de administración del enrutador y controlar completamente el enrutador sin el conocimiento de las credenciales. • https://www.exploit-db.com/exploits/47483 •

CVSS: 4.8EPSS: 0%CPEs: 2EXPL: 2

21 May 2019 — TP-Link TL-WR840N v5 00000005 devices allow XSS via the network name. The attacker must log into the router by breaking the password and going to the admin login page by THC-HYDRA to get the network name. With an XSS payload, the network name changed automatically and the internet connection was disconnected. All the users become disconnected from the internet. Los dispositivos TP-Link TL-WR840N v5 00000005 permiten una vulnerabilidad de tipo XSS por medio del parámetro network name. • https://packetstorm.news/files/id/153027 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 2EXPL: 1

15 May 2019 — TP-Link Archer CR-700 1.0.6 devices have an XSS vulnerability that can be introduced into the admin account through a DHCP request, allowing the attacker to steal the cookie information, which contains the base64 encoded username and password. Los dispositivos TP-Link Archer CR-700 1.0.6 tienen una vulnerabilidad XSS que se puede introducir en la cuenta de administrador a través de una solicitud DHCP, lo que permite al atacante robar la información de la cookie, que contiene el nombre de usuario y la contra... • https://packetstormsecurity.com/files/138881/TP-Link-Archer-CR-700-Cross-Site-Scripting.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 1

16 Apr 2019 — The ping feature in the Diagnostic functionality on TP-LINK WR840N v2 Firmware 3.16.9 Build 150701 Rel.51516n devices allows remote attackers to cause a denial of service (HTTP service termination) by modifying the packet size to be higher than the UI limit of 1472. La función ping en la funcionalidad de diagnóstico en TP-LINK WR840N v2 Firmware 3.16.9 Build 150701 Rel.51516n podría permitir a los atacantes remotos causar una denegación de servicio (terminación del servicio HTTP) modificando el tamaño del p... • https://youtu.be/VGNEYWR9MgY •

CVSS: 9.0EPSS: 19%CPEs: 4EXPL: 2

09 Apr 2019 — TP-Link TL-WR940N is vulnerable to a stack-based buffer overflow, caused by improper bounds checking by the ipAddrDispose function. By sending specially crafted ICMP echo request packets, a remote authenticated attacker could overflow a buffer and execute arbitrary code on the system with elevated privileges. TP-Link TL-WR940N es vulnerable a un desbordamiento de búfer basado en la pila, causado por una verificación de límites inadecuada por la función ipAddrDispose. Al enviar paquetes de solicitud de eco I... • https://packetstorm.news/files/id/152458 • CWE-787: Out-of-bounds Write •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

29 Mar 2019 — TP-Link TL-WR840N devices allow remote attackers to cause a denial of service (networking outage) via fragmented packets, as demonstrated by an "nmap -f" command. Los dispositivos TP-Link TL-WR840N permiten a los atacantes remotos provocar una denegación de servicio (interrupción de interconexión) mediante paquetes fragmentados, tal y como queda demostrado con un comando "nmap -f". • https://hackingvila.wordpress.com/2019/02/17/tp-link-wireless-n-router-wr840n-buffer-overflow-cve-2018-15840 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 8.8EPSS: 24%CPEs: 10EXPL: 2

18 Jan 2019 — TP-Link WDR Series devices through firmware v3 (such as TL-WDR5620 V3.0) are affected by command injection (after login) leading to remote code execution, because shell metacharacters can be included in the weather get_weather_observe citycode field. Los dispositivos TP-Link WDR Series hasta la versión de firmware v3 (como TL-WDR5620 V3.0) se ven afectados por una inyección de comandos (después de iniciar sesión), conduciendo a la ejecución remota de código debido a que se pueden incluir metacaracteres shel... • https://github.com/afang5472/TP-Link-WDR-Router-Command-injection_POC • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.4EPSS: 0%CPEs: 2EXPL: 2

23 Dec 2018 — TP-Link TD-W8961ND devices allow XSS via the hostname of a DHCP client. Los dispositivos TP-Link TD-W8961ND permiten Cross-Site Scripting (XSS) mediante el nombre de host de un cliente DHCP. • https://www.vulnerability-lab.com/get_content.php?id=1990 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.2EPSS: 10%CPEs: 2EXPL: 1

01 Dec 2018 — An exploitable remote code execution vulnerability exists in the HTTP header-parsing function of the TP-Link TL-R600VPN HTTP Server. A specially crafted HTTP request can cause a buffer overflow, resulting in remote code execution on the device. An attacker can send an authenticated HTTP request to trigger this vulnerability. Existe una vulnerabilidad explotable de ejecución remota de código en la funcionalidad de análisis de cabeceras HTTP en el servidor HTTP TP-Link TL-R600VPN. Una petición HTTP especialme... • https://talosintelligence.com/vulnerability_reports/TALOS-2018-0620 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •