CVE Datenbank
Durchsuchbare Datenbank mit Sicherheitslücken. Filtere nach Hersteller, Schweregrad oder Zeitraum.
CVE-2026-30818 - An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an au
CVE-2026-30817 - An external configuration control vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows an
CVE-2026-30816 - An external control of configuration vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows
CVE-2026-30815 - An OS command injection vulnerability in the OpenVPN module of TP-Link Archer AX53 v1.0 allows an au
CVE-2026-30814 - A stack-based buffer overflow in the tmpServer module of TP-Link Archer AX53 v1.0 allows an authenti
CVE-2026-34124 - A denial-of-service vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTTP request
CVE-2026-34122 - A stack-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within a conf
CVE-2026-34121 - An authentication bypass vulnerability within the HTTP handling of the DS configuration service in T
CVE-2026-34120 - A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the asy
CVE-2026-34119 - A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 within the HTT
CVE-2026-34118 - A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 in the HTTP PO
CVE-2025-15606 - A Denial-of-Service (DoS) vulnerability in the httpd component of TP-Link's TD-W8961N v4.0 due to im
CVE-2025-15605 - A hardcoded cryptographic key within the configuration mechanism on TP-Link Archer NX200, NX210, NX5
CVE-2025-15519 - Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX
CVE-2025-15518 - Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX
CVE-2025-15517 - A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to
CVE-2026-3227 - A command injection vulnerability was identified in TP-Link TL-WR802N v4, TL-WR841N v14, and TL-WR84
CVE-2026-3841 - A command injection vulnerability has been identified in the Telnet command-line interface (CLI) of
CVE-2026-0655 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in TP-L
CVE-2026-0654 - Improper input handling in the administration web interface on TP-Link Deco BE25 v1.0 allows crafted
CVE-2026-1571 - User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C6
CVE-2026-0653 - On TP-Link Tapo C260 v1 and D235 v1, a guest‑level authenticated user can bypass intended access res
CVE-2026-0652 - On TP-Link Tapo C260 v1, command injection vulnerability exists due to improper sanitization in cert
CVE-2026-0651 - A path traversal vulnerability was identified TP-Link Tapo C260 v1, D235 v1 and C520WS v2.6 within t
CVE-2025-15557 - An Improper Certificate Validation vulnerability in TP-Link Tapo H100 v1 and Tapo P100 v1 allows an
CVE-2025-15551 - The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any r
CVE-2025-62673 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tdpserver modules) allows adja
CVE-2025-62501 - SSH Hostkey misconfiguration vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows at
CVE-2025-62405 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth
CVE-2025-62404 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth
CVE-2025-61983 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth
CVE-2025-61944 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth
CVE-2025-59487 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth
CVE-2025-59482 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth
CVE-2025-58455 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth
CVE-2025-58077 - Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows auth
CVE-2026-22228 - An authenticated user with high privileges may trigger a denial‑of‑service condition in TP-Link Arch
CVE-2026-22220 - A lack of proper input validation in the HTTP processing path in TP-Link Archer BE230 v1.2 (web modu
CVE-2026-22229 - A command injection vulnerability may be exploited after the admin's authentication via the import o
CVE-2026-22227 - A command injection vulnerability may be exploited after the admin's authentication via the configur
CVE-2026-22226 - A command injection vulnerability may be exploited after the admin's authentication in the VPN serve
CVE-2026-22224 - A command injection vulnerability may be exploited after the admin's authentication in the cloud com
CVE-2026-22223 - An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent au
CVE-2026-22222 - An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent au
CVE-2026-22221 - An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent au
CVE-2026-0631 - An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows an adjacent
CVE-2026-0630 - An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) and Archer AXE75 v1.
CVE-2026-1457 - An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, ma
CVE-2025-14756 - Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v
🏢 CVE nach Hersteller
Empfohlene Sicherheitstools
Unterstütze uns durch einen Kauf - wir erhalten eine kleine Provision.