CVSS: 6.8EPSS: 0%CPEs: 2EXPL: 0CVE-2026-4346 – Cleartext Storage of Administrative and Wi-Fi Credentials via Accessible Serial Interface in TP Link's TL-WR850N
https://notcve.org/view.php?id=CVE-2026-4346
26 Mar 2026 — The vulnerability affecting TL-WR850N v3 allows cleartext storage of administrative and Wi-Fi credentials in a region of the device’s flash memory while the serial interface remains enabled and protected by weak authentication. An attacker with physical access and the ability to connect to the serial port can recover sensitive information, including the router’s management password and wireless network key. Successful exploitation can lead to full administrative control of the device and unauthorized access... • https://www.tp-link.com/in/support/download/tl-wr850n/#Firmware • CWE-312: Cleartext Storage of Sensitive Information •
CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-3622 – Denial-of-Service Vulnerability in UPnP Component of TP Link's TL-WR841N
https://notcve.org/view.php?id=CVE-2026-3622
26 Mar 2026 — The vulnerability exists in the UPnP component of TL-WR841N v14, where improper input validation leads to an out-of-bounds read, potentially causing a crash of the UPnP service. Successful exploitation can cause the UPnP service to crash, resulting in a Denial-of-Service condition. This vulnerability affects TL-WR841N v14 < EN_0.9.1 4.19 Build 260303 Rel.42399n (V14_260303) and < US_0.9.1.4.19 Build 260312 Rel. 49108n (V14_0304). La vulnerabilidad existe en el componente UPnP del TL-WR841N v14, donde una va... • https://www.tp-link.com/en/support/download/tl-wr841n/v14/#Firmware • CWE-125: Out-of-bounds Read •
CVSS: 6.9EPSS: 0%CPEs: 2EXPL: 0CVE-2025-7375 – Unauthenticated Denial-of-Service Vulnerability in Omada EAP610
https://notcve.org/view.php?id=CVE-2025-7375
05 Mar 2026 — A denial-of-service (DoS) vulnerability was identified in Omada EAP610 v3. An attacker with adjacent network access can send crafted requests to cause the device’s HTTP service to crash. This results in temporary service unavailability until the device is rebooted. This issue affects Omada EAP610 firmware versions prior to 1.6.0. Se identificó una vulnerabilidad de denegación de servicio (DoS) en Omada EAP610 v3. Un atacante con acceso a la red adyacente puede enviar solicitudes manipuladas para provocar qu... • https://support.omadanetworks.com/en/product/eap610/v3 • CWE-20: Improper Input Validation •
CVSS: 9.1EPSS: 0%CPEs: 14EXPL: 0CVE-2025-9293 – Insufficient Certificate Validation in Multiple Mobile Applications Allows Man in the Middle Interception
https://notcve.org/view.php?id=CVE-2025-9293
13 Feb 2026 — A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication. An attacker in a privileged network position may be able to intercept or modify traffic if they can position themselves within the communication channel. Successful exploitation may compromise confidentiality, integrity, and availability of application data. • https://www.tp-link.com/us/support/faq/4969 • CWE-295: Improper Certificate Validation •
CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0CVE-2025-15557 – Improper Certificate Validation in TP-Link Tapo H100 and P100 Allows Man-in-the-Middle Attack
https://notcve.org/view.php?id=CVE-2025-15557
05 Feb 2026 — An Improper Certificate Validation vulnerability in TP-Link Tapo H100 v1 and Tapo P100 v1 allows an on-path attacker on the same network segment to intercept and modify encrypted device-cloud communications. This may compromise the confidentiality and integrity of device-to-cloud communication, enabling manipulation of device data or operations. • https://www.tp-link.com/en/support/download/tapo-h100 • CWE-295: Improper Certificate Validation •
CVSS: 8.6EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22229 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2 and Deco BE25 v1.0
https://notcve.org/view.php?id=CVE-2026-22229
02 Feb 2026 — A command injection vulnerability may be exploited after the admin's authentication via the import of a crafted VPN client configuration file on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22227 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2
https://notcve.org/view.php?id=CVE-2026-22227
02 Feb 2026 — A command injection vulnerability may be exploited after the admin's authentication via the configuration backup restoration function of the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each i... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22226 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2
https://notcve.org/view.php?id=CVE-2026-22226
02 Feb 2026 — A command injection vulnerability may be exploited after the admin's authentication in the VPN server configuration module on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is ... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22225 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2 and AXE75 v1.0
https://notcve.org/view.php?id=CVE-2026-22225
02 Feb 2026 — A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a u... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22224 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2
https://notcve.org/view.php?id=CVE-2026-22224
02 Feb 2026 — A command injection vulnerability may be exploited after the admin's authentication in the cloud communication interface on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tr... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
