CVSS: 8.8EPSS: 0%CPEs: 2EXPL: 1CVE-2018-12574 – TP-Link TL-WR841N V13 Cross Site Request Forgery
https://notcve.org/view.php?id=CVE-2018-12574
28 Jun 2018 — CSRF exists for all actions in the web interface on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices. Existe CSRF para todas las acciones en la interfaz web en dispositivos TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n. TP-Link TL-WR841N v13 suffers from cross site request forgery vulnerabilities. • https://packetstorm.news/files/id/148349 • CWE-352: Cross-Site Request Forgery (CSRF) •
CVSS: 8.8EPSS: 3%CPEs: 2EXPL: 1CVE-2018-12577 – TP-Link TL-WR841N V13 Command Injection
https://notcve.org/view.php?id=CVE-2018-12577
28 Jun 2018 — The Ping and Traceroute features on TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n devices allow authenticated blind Command Injection. Las funcionalidades Ping y Traceroute en dispositivos TP-Link TL-WR841N v13 00000001 0.9.1 4.16 v0001.0 Build 180119 Rel.65243n permiten la inyección de comandos ciega autenticada. TP-Link TL-WR841N v13 suffers from a blind command injection vulnerability. • https://packetstorm.news/files/id/148350 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.8EPSS: 5%CPEs: 2EXPL: 2CVE-2018-12692
https://notcve.org/view.php?id=CVE-2018-12692
23 Jun 2018 — TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote authenticated users to execute arbitrary commands via shell metacharacters in the wps_setup_pin parameter to /data/wps.setup.json. TP-Link TL-WA850RE Wi-Fi Range Extender con hardware en su versión 5 permite que usuarios autenticados remotos ejecuten comandos arbitrarios mediante metacaracteres shell en el parámetro wps_setup_pin en /data/wps.setup.json. • https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 6.8EPSS: 1%CPEs: 2EXPL: 1CVE-2018-12693
https://notcve.org/view.php?id=CVE-2018-12693
23 Jun 2018 — Stack-based buffer overflow in TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote authenticated users to cause a denial of service (outage) via a long type parameter to /data/syslog.filter.json. Desbordamiento de búfer basado en pila en TP-Link TL-WA850RE Wi-Fi Range Extender con el hardware en su versión 5 permite que usuarios autenticados remotos provoquen una denegación de servicio (DoS) mediante un parámetro type largo en /data/syslog.filter.json. • https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc • CWE-787: Out-of-bounds Write •
CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1CVE-2018-12694
https://notcve.org/view.php?id=CVE-2018-12694
23 Jun 2018 — TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote attackers to cause a denial of service (reboot) via data/reboot.json. TP-Link TL-WA850RE Wi-Fi Range Extender con el hardware en su versión 5 permite que atacantes remotos provoquen una denegación de servicio (reinicio) mediante data/reboot.json. • https://medium.com/advisability/the-in-security-of-the-tp-link-technologies-tl-wa850re-wi-fi-range-extender-26db87a7a0cc • CWE-20: Improper Input Validation •
CVSS: 10.0EPSS: 5%CPEs: 4EXPL: 3CVE-2018-11714
https://notcve.org/view.php?id=CVE-2018-11714
04 Jun 2018 — An issue was discovered on TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.58696n and TL-WR841N v13 00000013 0.9.1 4.16 v0001.0 Build 170622 Rel.64334n devices. This issue is caused by improper session handling on the /cgi/ folder or a /cgi file. If an attacker sends a header of "Referer: http://192.168.0.1/mainFrame.htm" then no authentication is required for any action. Se ha descubierto un problema en los dispositivos TP-Link TL-WR840N v5 00000005 0.9.1 3.16 v0001.0 Build 170608 Rel.586... • https://github.com/mikelkarma/cve-2018-11714_POC • CWE-384: Session Fixation •
CVSS: 8.8EPSS: 1%CPEs: 8EXPL: 0CVE-2018-11481
https://notcve.org/view.php?id=CVE-2018-11481
30 May 2018 — TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-*, and TL-IPC40A-4 devices allow authenticated remote code execution via crafted JSON data because /usr/lib/lua/luci/torchlight/validator.lua does not block various punctuation characters. Los dispositivos TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-* y TL-IPC40A-4 permiten la ejecución remota de código mediante datos JSON manipulados debido a que /usr/lib/lua/luci/torchlight/validator.lua no bloquea varios caracteres de puntuación. • https://github.com/yough3rt/IOT-pwn-for-fun/blob/master/TP-LINK-websys-Authenticated-RCE • CWE-20: Improper Input Validation •
CVSS: 9.8EPSS: 0%CPEs: 8EXPL: 0CVE-2018-11482
https://notcve.org/view.php?id=CVE-2018-11482
30 May 2018 — /usr/lib/lua/luci/websys.lua on TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-*, and TL-IPC40A-4 devices has a hardcoded zMiVw8Kw0oxKXL0 password. /usr/lib/lua/luci/websys.lua en dispositivos TP-LINK IPC TL-IPC223(P)-6, TL-IPC323K-D, TL-IPC325(KP)-* y TL-IPC40A-4 tiene una contraseña zMiVw8Kw0oxKXL0 embebida. • https://github.com/yough3rt/IOT-pwn-for-fun/blob/master/TP-LINK-login-Escalation-of-Privileges • CWE-798: Use of Hard-coded Credentials •
CVSS: 9.0EPSS: 1%CPEs: 76EXPL: 3CVE-2017-15634 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15634
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the name variable in the wportal.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable name en el archivo wportal.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •
CVSS: 9.0EPSS: 1%CPEs: 76EXPL: 3CVE-2017-15619 – TP-Link Remote Command Injection
https://notcve.org/view.php?id=CVE-2017-15619
11 Jan 2018 — TP-Link WVR, WAR and ER devices allow remote authenticated administrators to execute arbitrary commands via command injection in the pptphellointerval variable in the pptp_client.lua file. Los dispositivos TP-Link WVR, WAR y ER permiten que administradores autenticados remotos ejecuten comandos arbitrarios mediante inyección de comandos en la variable pptphellointerval en el archivo pptp_client.lua. Many TP-Link products suffer from multiple authenticated remote command injection vulnerabilities. • https://packetstorm.news/files/id/145823 •
