CVE Datenbank

Durchsuchbare Datenbank mit Sicherheitslücken. Filtere nach Hersteller, Schweregrad oder Zeitraum.

Zurücksetzen
49 CVEs gefunden (Seite 1/1)

CVE-2026-30818 - An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an au

🏢 Tp-link 📅 8.4.2026 📊 CVSS: 8.0
8.0

CVE-2026-30817 - An external configuration control vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows an

🏢 Tp-link 📅 8.4.2026 📊 CVSS: 5.7
5.7

CVE-2026-30816 - An external control of configuration vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows

🏢 Tp-link 📅 8.4.2026 📊 CVSS: 5.7
5.7

CVE-2026-30815 - An OS command injection vulnerability in the OpenVPN module of TP-Link Archer AX53 v1.0 allows an au

🏢 Tp-link 📅 8.4.2026 📊 CVSS: 8.0
8.0

CVE-2026-30814 - A stack-based buffer overflow in the tmpServer module of TP-Link Archer AX53 v1.0 allows an authenti

🏢 Tp-link 📅 8.4.2026 📊 CVSS: 8.0
8.0

CVE-2026-34124 - A denial-of-service vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP request

🏢 Tp-link 📅 2.4.2026 📊 CVSS: 6.5
6.5

CVE-2026-34122 - A stack-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within a conf

🏢 Tp-link 📅 2.4.2026 📊 CVSS: 6.5
6.5

CVE-2026-34121 - An authentication bypass vulnerability within the HTTP handling of the DS configuration service in T

🏢 Tp-link 📅 2.4.2026 📊 CVSS: 8.8
8.8

CVE-2026-34120 - A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the asy

🏢 Tp-link 📅 2.4.2026 📊 CVSS: 6.5
6.5

CVE-2026-34119 - A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTT

🏢 Tp-link 📅 2.4.2026 📊 CVSS: 6.5
6.5

CVE-2026-34118 - A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 in the HTTP PO

🏢 Tp-link 📅 2.4.2026 📊 CVSS: 6.5
6.5

CVE-2025-15606 - A Denial-of-Service (DoS) vulnerability in the httpd component of TP-Link's TD-W8961N v4.0 due to im

🏢 Tp-link 📅 23.3.2026 📊 CVSS: 7.5
7.5

CVE-2025-15605 - A hardcoded cryptographic key within the configuration mechanism on TP-Link Archer NX200, NX210, NX5

🏢 Tp-link 📅 23.3.2026 📊 CVSS: 7.3
7.3

CVE-2025-15519 - Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX

🏢 Tp-link 📅 23.3.2026 📊 CVSS: 7.2
7.2

CVE-2025-15518 - Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX

🏢 Tp-link 📅 23.3.2026 📊 CVSS: 7.2
7.2

CVE-2025-15517 - A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to

🏢 Tp-link 📅 23.3.2026 📊 CVSS: 8.1
8.1

CVE-2026-3227 - A command injection vulnerability was identified in TP-Link TL-WR802N v4, TL-WR841N v14, and TL-WR84

🏢 Tp-link 📅 16.3.2026 📊 CVSS: 6.8
6.8

CVE-2026-3841 - A command injection vulnerability has been identified in the Telnet command-line interface (CLI) of

🏢 Tp-link 📅 12.3.2026 📊 CVSS: 8.8
8.8

CVE-2026-0655 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in TP-L

🏢 Tp-link 📅 2.3.2026 📊 CVSS: 8.0
8.0

CVE-2026-0654 - Improper input handling in the administration web interface on TP-Link Deco BE25 v1.0 allows crafted

🏢 Tp-link 📅 2.3.2026 📊 CVSS: 8.0
8.0

CVE-2026-1571 - User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C6

🏢 Tp-link 📅 11.2.2026 📊 CVSS: 6.1
6.1

CVE-2026-0653 - On TP-Link Tapo C260 v1 and D235 v1, a guest‑level authenticated user can bypass intended access res

🏢 Tp-link 📅 10.2.2026 📊 CVSS: 6.5
6.5

CVE-2026-0652 - On TP-Link Tapo C260 v1, command injection vulnerability exists due to improper sanitization in cert

🏢 Tp-link 📅 10.2.2026 📊 CVSS: 8.8
8.8

CVE-2026-0651 - A path traversal vulnerability was identified TP-Link Tapo C260 v1, D235 v1 and C520WS v2.6 within t

🏢 Tp-link 📅 10.2.2026 📊 CVSS: 7.8
7.8

CVE-2025-15557 - An Improper Certificate Validation vulnerability in TP-Link Tapo H100 v1 and Tapo P100 v1 allows an

🏢 Tp-link 📅 5.2.2026 📊 CVSS: 8.8
8.8

CVE-2025-15551 - The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any r

🏢 Tp-link 📅 5.2.2026 📊 CVSS: 5.6
5.6

CVE-2025-62673 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tdpserver modules) allows adja

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 8.0
8.0

CVE-2025-62501 - SSH Hostkey misconfiguration vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows at

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 8.1
8.1

CVE-2025-62405 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 8.0
8.0

CVE-2025-62404 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 8.0
8.0

CVE-2025-61983 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 8.0
8.0

CVE-2025-61944 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 8.0
8.0

CVE-2025-59487 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 8.0
8.0

CVE-2025-59482 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 8.0
8.0

CVE-2025-58455 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 8.0
8.0

CVE-2025-58077 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 8.0
8.0

CVE-2026-22228 - An authenticated user with high privileges may trigger a denial‑of‑service condition in TP-Link Arch

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 4.9
4.9

CVE-2026-22220 - A lack of proper input validation in the HTTP processing path in TP-Link Archer BE230 v1.2 (web modu

🏢 Tp-link 📅 3.2.2026 📊 CVSS: 4.5
4.5

CVE-2026-22229 - A command injection vulnerability may be exploited after the admin's authentication via the import o

🏢 Tp-link 📅 2.2.2026 📊 CVSS: 7.2
7.2

CVE-2026-22227 - A command injection vulnerability may be exploited after the admin's authentication via the configur

🏢 Tp-link 📅 2.2.2026 📊 CVSS: 7.2
7.2

CVE-2026-22226 - A command injection vulnerability may be exploited after the admin's authentication in the VPN serve

🏢 Tp-link 📅 2.2.2026 📊 CVSS: 7.2
7.2

CVE-2026-22224 - A command injection vulnerability may be exploited after the admin's authentication in the cloud com

🏢 Tp-link 📅 2.2.2026 📊 CVSS: 7.2
7.2

CVE-2026-22223 - An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent au

🏢 Tp-link 📅 2.2.2026 📊 CVSS: 8.0
8.0

CVE-2026-22222 - An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent au

🏢 Tp-link 📅 2.2.2026 📊 CVSS: 8.0
8.0

CVE-2026-22221 - An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent au

🏢 Tp-link 📅 2.2.2026 📊 CVSS: 8.0
8.0

CVE-2026-0631 - An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows an adjacent

🏢 Tp-link 📅 2.2.2026 📊 CVSS: 8.0
8.0

CVE-2026-0630 - An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) and Archer AXE75 v1.

🏢 Tp-link 📅 2.2.2026 📊 CVSS: 8.0
8.0

CVE-2026-1457 - An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, ma

🏢 Tp-link 📅 29.1.2026 📊 CVSS: 8.8
8.8

CVE-2025-14756 - Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v

🏢 Tp-link 📅 26.1.2026 📊 CVSS: 8.8
8.8

🏢 CVE nach Hersteller

Empfohlene Sicherheitstools

Unterstütze uns durch einen Kauf - wir erhalten eine kleine Provision.