Search Results (506 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2025-14631 1 Tp-link 2 Archer Be400, Archer Be400 Firmware 2026-03-12 6.5 Medium
A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modules) allows  an adjacent attacker to cause a denial-of-service (DoS) by triggering a device reboot. This issue affects Archer BE400: xi 1.1.0 Build 20250710 rel.14914.
CVE-2025-9520 1 Tp-link 1 Omada Controller 2026-03-11 6.8 Medium
An IDOR vulnerability exists in Omada Controllers that allows an attacker with Administrator permissions to manipulate requests and potentially hijack the Owner account.
CVE-2025-9521 1 Tp-link 1 Omada Controller 2026-03-11 6.5 Medium
Password Confirmation Bypass vulnerability in Omada Controllers, allowing an attacker with a valid session token to bypass secondary verification, and change the user’s password without proper confirmation, leading to weakened account security.
CVE-2025-9522 1 Tp-link 1 Omada Controller 2026-03-11 5.3 Medium
Blind Server-Side Request Forgery (SSRF) in Omada Controllers through webhook functionality, enabling crafted requests to internal services, which may lead to enumeration of information.
CVE-2026-0919 1 Tp-link 7 Tapo, Tapo C220, Tapo C220 Firmware and 4 more 2026-03-11 7.5 High
The HTTP parser of Tapo C220 v1 and C520WS v2 cameras improperly handles requests containing an excessively long URL path. An invalid‑URL error path continues into cleanup code that assumes allocated buffers exist, leading to a crash and service restart. An unauthenticated attacker can force repeated service crashes or device reboots, causing denial of service.
CVE-2026-1315 1 Tp-link 7 Tapo, Tapo C220, Tapo C220 Firmware and 4 more 2026-03-11 7.5 High
By sending crafted files to the firmware update endpoint of Tapo C220 v1 and C520WS v2, the device terminates core system services before verifying authentication or firmware integrity. An unauthenticated attacker can trigger a persistent denial of service, requiring a manual reboot or application initiated restart to restore normal device operation.
CVE-2026-0654 1 Tp-link 2 Deco Be25, Deco Be25 Firmware 2026-03-11 8.0 High
Improper input handling in the administration web interface on TP-Link Deco BE25 v1.0 allows crafted input to be executed as part of an OS command. An authenticated adjacent attacker may execute arbitrary commands via crafted configuration file, impacting confidentiality, integrity and availability of the device. This issue affects Deco BE25 v1.0: through 1.1.1 Build 20250822.
CVE-2026-1571 1 Tp-link 3 Archer C50 V3, Archer C60, Archer C60 Firmware 2026-03-10 6.1 Medium
User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted.
CVE-2025-7375 1 Tp-link 3 Eap610 V3, Omada Eap610, Omada Eap610 Firmware 2026-03-09 6.5 Medium
A denial-of-service (DoS) vulnerability was identified in Omada EAP610 v3. An attacker with adjacent network access can send crafted requests to cause the device’s HTTP service to crash. This results in temporary service unavailability until the device is rebooted. This issue affects Omada EAP610 firmware versions prior to 1.6.0.
CVE-2025-15543 1 Tp-link 2 Vx800v, Vx800v Firmware 2026-03-09 4.6 Medium
Improper link resolution in USB HTTP access path in VX800v v1.0 allows a crafted USB device to expose root filesystem contents, giving an attacker with physical access read‑only access to system files.
CVE-2025-15548 1 Tp-link 2 Vx800v, Vx800v Firmware 2026-03-09 6.5 Medium
Some VX800v v1.0 web interface endpoints transmit sensitive information over unencrypted HTTP due to missing application layer encryption, allowing a network adjacent attacker to intercept this traffic and compromise its confidentiality.
CVE-2025-15542 1 Tp-link 2 Vx800v, Vx800v Firmware 2026-03-09 5.3 Medium
Improper handling of exceptional conditions in VX800v v1.0 in SIP processing allows an attacker to flood the device with crafted INVITE messages, blocking all voice lines and causing a denial of service on incoming calls.
CVE-2025-15541 1 Tp-link 2 Vx800v, Vx800v Firmware 2026-03-09 6.3 Medium
Improper link resolution in the VX800v v1.0 SFTP service allows authenticated adjacent attackers to use crafted symbolic links to access system files, resulting in high confidentiality impact and limited integrity risk.
CVE-2025-13399 1 Tp-link 2 Vx800v, Vx800v Firmware 2026-03-09 8.8 High
A weakness in the web interface’s application layer encryption in VX800v v1.0 allows an adjacent attacker to brute force the weak AES key and decrypt intercepted traffic. Successful exploitation requires network proximity but no authentication, and may result in high impact to confidentiality, integrity, and availability of transmitted data.
CVE-2026-1457 1 Tp-link 2 Vigi C385, Vigi C385 Firmware 2026-03-09 8.8 High
An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.
CVE-2025-15545 1 Tp-link 2 Archer Re605x, Archer Re605x Firmware 2026-03-09 6.8 Medium
The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability.
CVE-2025-15035 1 Tp-link 2 Archer Axe75, Archer Axe75 Firmware 2026-03-09 7.3 High
Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn modules) allows an authenticated adjacent attacker to delete arbitrary server file, leading to possible loss of critical system files and service interruption or degraded functionality.This issue affects Archer AXE75 v1.6: ≤ build 20250107.
CVE-2025-14756 1 Tp-link 2 Archer Mr600, Archer Mr600 Firmware 2026-03-09 8.8 High
Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise.
CVE-2025-14175 1 Tp-link 3 Tl-wr802n, Tl-wr820n, Tl-wr820n Firmware 2026-03-08 6.5 Medium
A vulnerability in the SSH server of TP-Link TL-WR820N v2.80 allows the use of a weak cryptographic algorithm, enabling an adjacent attacker to intercept and decrypt SSH traffic. Exploitation may expose sensitive information and compromise confidentiality.
CVE-2026-0655 1 Tp-link 2 Deco Be25, Deco Be25 Firmware 2026-03-06 8.0 High
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in TP-Link Deco BE25 v1.0 (web modules) allows authenticated adjacent attacker to read arbitrary files or cause denial of service.  This issue affects Deco BE25 v1.0: through 1.1.1 Build 20250822.