TP-Link TL-WR886N 7.0 1.1.0 devices allow remote attackers to cause a denial of service (Tlb Load Exception) via crafted DNS packets to port 53/udp.
Max CVSS
10.0
EPSS Score
0.69%
Published
2018-11-26
Updated
2018-12-19
The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Cookie field.
Max CVSS
6.5
EPSS Score
0.06%
Published
2018-10-01
Updated
2018-11-27
The web interface in TP-Link TL-WRN841N 0.9.1 4.16 v0348.0 is vulnerable to a denial of service when an unauthenticated LAN user sends a crafted HTTP header containing an unexpected Referer field.
Max CVSS
6.5
EPSS Score
0.06%
Published
2018-10-01
Updated
2018-11-27
TP-Link WR840N devices allow remote attackers to cause a denial of service (connectivity loss) via a series of packets with random MAC addresses.
Max CVSS
7.5
EPSS Score
7.90%
Published
2018-07-19
Updated
2018-09-18
TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote attackers to cause a denial of service (reboot) via data/reboot.json.
Max CVSS
7.8
EPSS Score
0.19%
Published
2018-06-23
Updated
2018-08-24
Stack-based buffer overflow in TP-Link TL-WA850RE Wi-Fi Range Extender with hardware version 5 allows remote authenticated users to cause a denial of service (outage) via a long type parameter to /data/syslog.filter.json.
Max CVSS
6.8
EPSS Score
0.13%
Published
2018-06-23
Updated
2020-08-24
An exploitable denial-of-service vulnerability exists in the URI-parsing functionality of the TP-Link TL-R600VPN HTTP server. A specially crafted URL can cause the server to stop responding to requests, resulting in downtime for the management portal. An attacker can send either an unauthenticated or authenticated web request to trigger this vulnerability.
Max CVSS
7.5
EPSS Score
0.10%
Published
2018-11-30
Updated
2023-02-03
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!