Search Results (508 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-2026-1668 1 Tp-link 39 Sg2005p-pd, Sg2008, Sg2008p and 36 more 2026-03-16 N/A
The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests. Under specific conditions, this flaw may result in unintended command execution.<br>An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure. Successful exploitation may allow remote code execution or denial-of-service.
CVE-2026-0653 1 Tp-link 3 Tapo C260, Tapo C260 Firmware, Tapo C260 V1 2026-03-13 6.5 Medium
On TP-Link Tapo C260 v1 and D235 v1, a guest‑level authenticated user can bypass intended access restrictions by sending crafted requests to a synchronization endpoint. This allows modification of protected device settings despite limited privileges. An attacker may change sensitive configuration parameters without authorization, resulting in unauthorized device state manipulation but not full code execution.
CVE-2026-0651 1 Tp-link 3 Tapo C260, Tapo C260 Firmware, Tapo C260 V1 2026-03-13 7.8 High
On TP-Link Tapo C260 v1 and D235 v1, path traversal is possible due to improper handling of specific GET request paths via https, allowing local unauthenticated probing of filesystem paths. An attacker on the local network can determine whether certain files exists on the device, with no read, write or code execution possibilities.
CVE-2025-15568 1 Tp-link 1 Archer Axe75 2026-03-13 N/A
A command injection vulnerability was identified in the web module of Archer AXE75 v1.6/v1.0 router. An authenticated attacker with adjacent-network access may be able to perform remote code execution (RCE) when the router is configured with sysmode=ap. Successful exploitation results in root-level privileges and impacts confidentiality, integrity and availability of the device. This issue affects Archer AXE75 v1.6/v1.0: through 1.3.2 Build 20250107.
CVE-2025-14631 1 Tp-link 2 Archer Be400, Archer Be400 Firmware 2026-03-12 6.5 Medium
A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modules) allows  an adjacent attacker to cause a denial-of-service (DoS) by triggering a device reboot. This issue affects Archer BE400: xi 1.1.0 Build 20250710 rel.14914.
CVE-2025-9520 1 Tp-link 1 Omada Controller 2026-03-11 6.8 Medium
An IDOR vulnerability exists in Omada Controllers that allows an attacker with Administrator permissions to manipulate requests and potentially hijack the Owner account.
CVE-2025-9521 1 Tp-link 1 Omada Controller 2026-03-11 6.5 Medium
Password Confirmation Bypass vulnerability in Omada Controllers, allowing an attacker with a valid session token to bypass secondary verification, and change the user’s password without proper confirmation, leading to weakened account security.
CVE-2025-9522 1 Tp-link 1 Omada Controller 2026-03-11 5.3 Medium
Blind Server-Side Request Forgery (SSRF) in Omada Controllers through webhook functionality, enabling crafted requests to internal services, which may lead to enumeration of information.
CVE-2026-0919 1 Tp-link 7 Tapo, Tapo C220, Tapo C220 Firmware and 4 more 2026-03-11 7.5 High
The HTTP parser of Tapo C220 v1 and C520WS v2 cameras improperly handles requests containing an excessively long URL path. An invalid‑URL error path continues into cleanup code that assumes allocated buffers exist, leading to a crash and service restart. An unauthenticated attacker can force repeated service crashes or device reboots, causing denial of service.
CVE-2026-1315 1 Tp-link 7 Tapo, Tapo C220, Tapo C220 Firmware and 4 more 2026-03-11 7.5 High
By sending crafted files to the firmware update endpoint of Tapo C220 v1 and C520WS v2, the device terminates core system services before verifying authentication or firmware integrity. An unauthenticated attacker can trigger a persistent denial of service, requiring a manual reboot or application initiated restart to restore normal device operation.
CVE-2026-0654 1 Tp-link 2 Deco Be25, Deco Be25 Firmware 2026-03-11 8.0 High
Improper input handling in the administration web interface on TP-Link Deco BE25 v1.0 allows crafted input to be executed as part of an OS command. An authenticated adjacent attacker may execute arbitrary commands via crafted configuration file, impacting confidentiality, integrity and availability of the device. This issue affects Deco BE25 v1.0: through 1.1.1 Build 20250822.
CVE-2026-1571 1 Tp-link 3 Archer C50 V3, Archer C60, Archer C60 Firmware 2026-03-10 6.1 Medium
User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted.
CVE-2025-7375 1 Tp-link 3 Eap610 V3, Omada Eap610, Omada Eap610 Firmware 2026-03-09 6.5 Medium
A denial-of-service (DoS) vulnerability was identified in Omada EAP610 v3. An attacker with adjacent network access can send crafted requests to cause the device’s HTTP service to crash. This results in temporary service unavailability until the device is rebooted. This issue affects Omada EAP610 firmware versions prior to 1.6.0.
CVE-2025-15543 1 Tp-link 2 Vx800v, Vx800v Firmware 2026-03-09 4.6 Medium
Improper link resolution in USB HTTP access path in VX800v v1.0 allows a crafted USB device to expose root filesystem contents, giving an attacker with physical access read‑only access to system files.
CVE-2025-15548 1 Tp-link 2 Vx800v, Vx800v Firmware 2026-03-09 6.5 Medium
Some VX800v v1.0 web interface endpoints transmit sensitive information over unencrypted HTTP due to missing application layer encryption, allowing a network adjacent attacker to intercept this traffic and compromise its confidentiality.
CVE-2025-15542 1 Tp-link 2 Vx800v, Vx800v Firmware 2026-03-09 5.3 Medium
Improper handling of exceptional conditions in VX800v v1.0 in SIP processing allows an attacker to flood the device with crafted INVITE messages, blocking all voice lines and causing a denial of service on incoming calls.
CVE-2025-15541 1 Tp-link 2 Vx800v, Vx800v Firmware 2026-03-09 6.3 Medium
Improper link resolution in the VX800v v1.0 SFTP service allows authenticated adjacent attackers to use crafted symbolic links to access system files, resulting in high confidentiality impact and limited integrity risk.
CVE-2025-13399 1 Tp-link 2 Vx800v, Vx800v Firmware 2026-03-09 8.8 High
A weakness in the web interface’s application layer encryption in VX800v v1.0 allows an adjacent attacker to brute force the weak AES key and decrypt intercepted traffic. Successful exploitation requires network proximity but no authentication, and may result in high impact to confidentiality, integrity, and availability of transmitted data.
CVE-2026-1457 1 Tp-link 2 Vigi C385, Vigi C385 Firmware 2026-03-09 8.8 High
An authenticated buffer handling flaw in TP-Link VIGI C385 V1 Web API lacking input sanitization, may allow memory corruption leading to remote code execution. Authenticated attackers may trigger buffer overflow and potentially execute arbitrary code with elevated privileges.
CVE-2025-15545 1 Tp-link 2 Archer Re605x, Archer Re605x Firmware 2026-03-09 6.8 Medium
The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability.