Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

TP-LINK

Source -

CNA

BOS Name -

TP-Link Systems Inc.

CNA CVEs -

16

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated ProductsRelated AssignersReports
16Vulnerabilities found

CVE-2024-9284
Assigner-VulDB
ShareView Details
Assigner-VulDB
CVSS Score-7.1||HIGH
EPSS-0.08% / 23.27%
||
7 Day CHG~0.00%
Published-27 Sep, 2024 | 16:31
Updated-15 Jul, 2025 | 18:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TP-LINK TL-WR841ND popupSiteSurveyRpm.htm stack-based overflow

A vulnerability was found in TP-LINK TL-WR841ND up to 20240920. It has been rated as critical. Affected by this issue is some unknown functionality of the file /userRpm/popupSiteSurveyRpm.htm. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-tl-wr841nd_firmwaretl-wr841ndTL-WR841NDtl-wr841nd_\(11.0\)_firmware
CWE ID-CWE-121
Stack-based Buffer Overflow
CVE-2024-38471
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-6.8||MEDIUM
EPSS-0.07% / 21.25%
||
7 Day CHG~0.00%
Published-04 Jul, 2024 | 00:49
Updated-13 Mar, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple TP-LINK products allow a network-adjacent attacker with an administrative privilege to execute arbitrary OS commands by restoring a crafted backup file. The affected device, with the initial configuration, allows login only from the LAN port or Wi-Fi.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-Archer AX5400Archer AX3000Archer AXE5400Archer AXE75Archer Air R5archer_ax5400_firmwarearcher_ax3000_firmwarearcher_axe75_firmwarearcher_airr5_firmwarearcher_axe5400_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-36489
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.14% / 34.77%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:35
Updated-26 Sep, 2024 | 20:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple TP-LINK products allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: TL-WR802N firmware versions prior to 'TL-WR802N(JP)_V4_221008', TL-WR841N firmware versions prior to 'TL-WR841N(JP)_V14_230506', and TL-WR902AC firmware versions prior to 'TL-WR902AC(JP)_V3_230506'.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-tl-wr802ntl-wr841ntl-wr841n_firmwaretl-wr902actl-wr802n_firmwaretl-wr902ac_firmwareTL-WR902ACTL-WR802NTL-WR841Ntl-wr802n_firmwaretl-wr902ac_firmwaretl-wr841n_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-31188
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8||HIGH
EPSS-0.08% / 24.92%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:28
Updated-27 Sep, 2024 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505', Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506', and Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616'.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_c55archer_c50_v3_firmwarearcher_c50_v3archer_c55_firmwareArcher C50Archer C55Archer C20archer_c50_v3_firmwarearcher_c20_firmwarearcher_c55_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-32619
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.09% / 26.21%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:27
Updated-26 Sep, 2024 | 21:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Archer C50 firmware versions prior to 'Archer C50(JP)_V3_230505' and Archer C55 firmware versions prior to 'Archer C55(JP)_V1_230506' use hard-coded credentials to login to the affected device, which may allow a network-adjacent unauthenticated attacker to execute an arbitrary OS command.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_c55archer_c50_v3_firmwarearcher_c50_v3archer_c55_firmwareArcher C50Archer C55archer_c50_v3_firmwarearcher_c55_firmware
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2023-37284
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.02% / 3.71%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:24
Updated-26 Sep, 2024 | 20:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper authentication vulnerability in Archer C20 firmware versions prior to 'Archer C20(JP)_V1_230616' allows a network-adjacent unauthenticated attacker to execute an arbitrary OS command via a crafted request to bypass authentication.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_c20archer_c20_firmwareArcher C20archer_c20_firmware
CWE ID-CWE-287
Improper Authentication
CVE-2023-38563
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.14% / 34.77%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:24
Updated-26 Sep, 2024 | 20:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Archer C1200 firmware versions prior to 'Archer C1200(JP)_V2_230508' and Archer C9 firmware versions prior to 'Archer C9(JP)_V3_230508' allow a network-adjacent unauthenticated attacker to execute arbitrary OS commands.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_c1200archer_c9_firmwarearcher_c1200_firmwarearcher_c9Archer C9Archer C1200archer_c90_firmwarearcher_c1200_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-38568
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-0.13% / 33.63%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:23
Updated-26 Sep, 2024 | 20:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Archer A10 firmware versions prior to 'Archer A10(JP)_V2_230504' allows a network-adjacent unauthenticated attacker to execute arbitrary OS commands.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_a10archer_a10_firmwareArcher A10archer_a10_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-38588
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8||HIGH
EPSS-0.08% / 23.92%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:23
Updated-26 Sep, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Archer C3150 firmware versions prior to 'Archer C3150(JP)_V2_230511' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_c3150_firmwarearcher_c3150Archer C3150archer_c3150_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-39224
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8||HIGH
EPSS-0.08% / 23.92%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:22
Updated-26 Sep, 2024 | 20:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Archer C5 firmware all versions and Archer C7 firmware versions prior to 'Archer C7(JP)_V2_230602' allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Note that Archer C5 is no longer supported, therefore the update for this product is not provided.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_c7_firmwarearcher_c7Archer C5Archer C7archer_c7_firmwarearcher_c5
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-39935
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8||HIGH
EPSS-0.08% / 23.92%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:22
Updated-26 Sep, 2024 | 20:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Archer C5400 firmware versions prior to 'Archer C5400(JP)_V2_230506' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_c5400_firmwarearcher_c5400Archer C5400archer_c5400_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-40193
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8||HIGH
EPSS-0.09% / 26.91%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:22
Updated-26 Sep, 2024 | 20:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Deco M4 firmware versions prior to 'Deco M4(JP)_V2_1.5.8 Build 20230619' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-deco_m4deco_m4_firmwareDeco M4deco_m4
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-40357
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8||HIGH
EPSS-0.10% / 27.95%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:21
Updated-27 Sep, 2024 | 20:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Multiple TP-LINK products allow a network-adjacent authenticated attacker to execute arbitrary OS commands. Affected products/versions are as follows: Archer AX50 firmware versions prior to 'Archer AX50(JP)_V1_230529', Archer A10 firmware versions prior to 'Archer A10(JP)_V2_230504', Archer AX10 firmware versions prior to 'Archer AX10(JP)_V1.2_230508', and Archer AX11000 firmware versions prior to 'Archer AX11000(JP)_V1_230523'.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_a10archer_ax10_firmwarearcher_ax11000archer_ax50archer_a10_firmwarearcher_ax10archer_ax11000_firmwarearcher_ax50_firmwareArcher AX50Archer A10Archer AX10Archer AX11000archer_a10_firmwarearcher_ax50_firmwarearcher_ax11000_firmwarearcher_ax10_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2023-40531
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8||HIGH
EPSS-0.09% / 26.91%
||
7 Day CHG~0.00%
Published-06 Sep, 2023 | 09:21
Updated-26 Sep, 2024 | 20:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Archer AX6000 firmware versions prior to 'Archer AX6000(JP)_V1_1.3.0 Build 20221208' allows a network-adjacent authenticated attacker to execute arbitrary OS commands.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-archer_ax6000_firmwarearcher_ax6000Archer AX6000archer_ax6000_firmware
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-4144
Assigner-JPCERT/CC
ShareView Details
Assigner-JPCERT/CC
CVSS Score-8.8||HIGH
EPSS-1.77% / 81.91%
||
7 Day CHG~0.00%
Published-23 Dec, 2021 | 06:30
Updated-03 Aug, 2024 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

TP-Link wifi router TL-WR802N V4(JP), with firmware version prior to 211202, is vulnerable to OS command injection.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-tl-wr802n_firmwaretl-wr802nTL-WR802N V4(JP)
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-5393
Assigner-CERT/CC
ShareView Details
Assigner-CERT/CC
CVSS Score-9.8||CRITICAL
EPSS-15.74% / 94.46%
||
7 Day CHG~0.00%
Published-28 Sep, 2018 | 17:00
Updated-05 Aug, 2024 | 05:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TP-Link EAP Controller versions 2.5.3 and earlier lack RMI authentication

The TP-LINK EAP Controller is TP-LINK's software for remotely controlling wireless access point devices. It utilizes a Java remote method invocation (RMI) service for remote control. The RMI interface does not require any authentication before use, so it lacks user authentication for RMI service commands in EAP controller versions 2.5.3 and earlier. Remote attackers can implement deserialization attacks through the RMI protocol. Successful attacks may allow a remote attacker to remotely control the target server and execute Java functions or bytecode.

Action-Not Available
Vendor-TP-Link Systems Inc.
Product-eap_controllerEAP Controller
CWE ID-CWE-306
Missing Authentication for Critical Function