
CVE-2023-40357
https://notcve.org/view.php?id=CVE-2023-40357
06 Sep 2023 — Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to 'Archer AX50(JP)_V1_230529', Archer A10 firmware versions prior to 'Archer A10(JP)_V2_230504', Archer AX10 firmware versions prior to 'Archer AX10(JP)_V1.2_230508', and Archer AX11000 firmware versions prior to 'Archer AX11000(JP)_V1_230523'. Múltiples productos TP-LINK permiten que un atacante autenticado adyacente a la... • https://jvn.jp/en/vu/JVNVU99392903 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2023-34832 – TP-Link Archer AX10(EU)_V1.2_230220 Buffer Overflow
https://notcve.org/view.php?id=CVE-2023-34832
16 Jun 2023 — TP-Link Archer AX10(EU)_V1.2_230220 was discovered to contain a buffer overflow via the function FUN_131e8 - 0x132B4. TP-Link Archer version AX10(EU)_V1.2_230220 suffers from a buffer overflow vulnerability. • http://archer.com • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2022-41540
https://notcve.org/view.php?id=CVE-2022-41540
18 Oct 2022 — The web app client of TP-Link AX10v1 V1_211117 uses hard-coded cryptographic keys when communicating with the router. Attackers who are able to intercept the communications between the web client and router through a man-in-the-middle attack can then obtain the sequence key via a brute-force attack, and access sensitive information. El cliente de la aplicación web de TP-Link AX10v1 versión V1_211117, usa claves criptográficas embebidas cuando es comunicado con el router. Los atacantes que son capaces de int... • https://github.com/efchatz/easy-exploits • CWE-798: Use of Hard-coded Credentials •

CVE-2022-41541
https://notcve.org/view.php?id=CVE-2022-41541
18 Oct 2022 — TP-Link AX10v1 V1_211117 allows attackers to execute a replay attack by using a previously transmitted encrypted authentication message and valid authentication token. Attackers are able to login to the web application as an admin user. TP-Link AX10v1 versión V1_211117, permite a atacantes ejecutar un ataque de repetición al usar un mensaje de autenticación encriptado previamente transmitido y un token de autenticación válido. Los atacantes son capaces de iniciar sesión en la aplicación web como un usuario ... • https://github.com/efchatz/easy-exploits/tree/main/Web/TP-Link/Replay • CWE-294: Authentication Bypass by Capture-replay •

CVE-2022-40486
https://notcve.org/view.php?id=CVE-2022-40486
28 Sep 2022 — TP Link Archer AX10 V1 Firmware Version 1.3.1 Build 20220401 Rel. 57450(5553) was discovered to allow authenticated attackers to execute arbitrary code via a crafted backup file. Se ha detectado que el firmware de TP Link Archer AX10 versión V1, versión 1.3.1 Build 20220401 Rel. 57450(5553), permitía a atacantes autenticados ejecutar código arbitrario por medio de un archivo de copia de seguridad diseñado • https://github.com/gscamelo/TP-Link-Archer-AX10-V1/blob/main/README.md • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2021-41451
https://notcve.org/view.php?id=CVE-2021-41451
17 Dec 2021 — A misconfiguration in HTTP/1.0 and HTTP/1.1 of the web interface in TP-Link AX10v1 before V1_211117 allows a remote unauthenticated attacker to send a specially crafted HTTP request and receive a misconfigured HTTP/0.9 response, potentially leading into a cache poisoning attack. Una configuración errónea en HTTP/1.0 y HTTP/1.1 de la interfaz web en TP-Link AX10v1 antes de V1_211117 permite que un atacante remoto no autenticado envíe una solicitud HTTP especialmente diseñada y reciba una respuesta HTTP/0.9 m... • http://ax10v1.com • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVE-2021-41450
https://notcve.org/view.php?id=CVE-2021-41450
08 Dec 2021 — An HTTP request smuggling attack in TP-Link AX10v1 before v1_211117 allows a remote unauthenticated attacker to DoS the web application via sending a specific HTTP packet. Un ataque de contrabando de peticiones HTTP en TP-Link AX10v1 versiones anteriores a v1_211117, permite a un atacante remoto no autenticado hacer DoS a la aplicación web por medio del envío de un paquete HTTP específico • http://ax10v1.com • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') •

CVE-2021-40288
https://notcve.org/view.php?id=CVE-2021-40288
07 Dec 2021 — A denial-of-service attack in WPA2, and WPA3-SAE authentication methods in TP-Link AX10v1 before V1_211014, allows a remote unauthenticated attacker to disconnect an already connected wireless client via sending with a wireless adapter specific spoofed authentication frames Un ataque de denegación de servicio en los métodos de autenticación WPA2 y WPA3-SAE en TP-Link AX10v1 versiones anteriores a V1_211014, permite a un atacante remoto no autenticado desconectar un cliente inalámbrico ya conectado por medio... • https://www.tp-link.com/us/support/download/archer-ax10/v1/#Firmware • CWE-290: Authentication Bypass by Spoofing •