TP-LINK Archer C1200 Wireless Router

Platform Information https://www.tp-link.com/kr/home-networking/wifi-router/archer-c1200/#specifications
Search Engine Search on Google
Category Wireless AP Device
End of Sales -
End of Life -
Wired Connection Yes
Wireless Connection Yes
Fingerprinting Source DHCP MAC OUI NIC VENDOR
Added at Sep 10, 2019
Manufacturer Name TP-Link Technologies Co., Ltd
Homepage http://www.tp-link.com/us/
Headquarters China
Business Status Ongoing

Platform’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
CVE-2019-13614
07/17/2019
CRITICAL
9.8
HIGH
7.5
CMD_SET_CONFIG_COUNTRY in the TP-Link Device Debug protocol in TP-Link Archer C1200 1.0.0 Build 20180502 rel.45702 and earlier is prone to a stack-based buffer overflow, which allows a remote attacker to achieve code execution or denial of service by sending a crafted payload to the listening server.
CVE-2019-13613
07/17/2019
CRITICAL
9.8
HIGH
7.5
CMD_FTEST_CONFIG in the TP-Link Device Debug protocol in TP-Link Wireless Router Archer Router version 1.0.0 Build 20180502 rel.45702 (EU) and earlier is prone to a stack-based buffer overflow, which allows a remote attacker to achieve code execution or denial of service by sending a crafted payload to the listening server.
CVE-2018-13134
07/04/2018
MEDIUM
6.1
MEDIUM
4.3
TP-Link Archer C1200 1.13 Build 2018/01/24 rel.52299 EU devices have XSS via the PATH_INFO to the /webpages/data URI.
Manufacturer’s Common Vulnerabilities and Exposures (CVE)
CVE-ID
Severity v3.0
Severity v2.0
Description
CVE-2019-16893
02/03/2020
HIGH
7.5
HIGH
7.8
The Web Management of TP-Link TP-SG105E V4 1.0.0 Build 20181120 devices allows an unauthenticated attacker to reboot the device via a reboot.cgi request.
CVE-2013-2646
02/03/2020
HIGH
7.5
MEDIUM
5
TP-LINK TL-WR1043ND V1_120405 devices contain an unspecified denial of service vulnerability.
CVE-2013-2573
01/29/2020
CRITICAL
9.8
HIGH
10
A Command Injection vulnerability exists in the ap parameter to the /cgi-bin/mft/wireless_mft.cgi file in TP-Link IP Cameras TL-SC 3130, TL-SC 3130G, 3171G. and 4171G 1.6.18P12s, which could let a malicious user execute arbitrary code.
CVE-2013-2572
01/29/2020
HIGH
7.5
MEDIUM
5
A Security Bypass vulnerability exists in TP-LINK IP Cameras TL-SC 3130, TL-SC 3130G, 3171G, 4171G, and 3130 1.6.18P12 due to default hard-coded credentials for the administrative Web interface, which could let a malicious user obtain unauthorized access to CGI files.
CVE-2019-19143
01/27/2020
MEDIUM
6.1
MEDIUM
4.1
TP-LINK TL-WR849N 0.9.1 4.16 devices do not require authentication to replace the firmware via a POST request to the cgi/softup URI.



Scroll to Top

We use cookies to help improve this website and enhance your browsing experience You can change your cookie settings at any time. • Privacy • Terms