Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Tl\-Wa801n_firmware
(Tp\-Link)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2021-03-26 | CVE-2021-3275 | Unauthenticated stored cross-site scripting (XSS) exists in multiple TP-Link products including WIFI Routers (Wireless AC routers), Access Points, ADSL + DSL Gateways and Routers, which affects TD-W9977v1, TL-WA801NDv5, TL-WA801Nv6, TL-WA802Nv5, and Archer C3150v2 devices through the improper validation of the hostname. Some of the pages including dhcp.htm, networkMap.htm, dhcpClient.htm, qsEdit.htm, and qsReview.htm and use this vulnerable hostname function (setDefaultHostname()) without... | Archer\-C3150_firmware, Td\-W9977_firmware, Tl\-Wa801n_firmware, Tl\-Wa801nd_firmware, Tl\-Wr802n_firmware | 6.1 | ||
2022-12-20 | CVE-2022-46914 | An issue in the firmware update process of TP-LINK TL-WA801N / TL-WA801ND V1 v3.12.16 and earlier allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via uploading a crafted firmware image. | Tl\-Wa801n_firmware, Tl\-Wa801nd_v1_firmware | 8.8 |