Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q6v4-fwc8-3mpc

Опубликовано: 05 фев. 2026
Источник: github
Github: Не прошло ревью
CVSS4: 5.9

Описание

The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.

The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.

EPSS

Процентиль: 7%
0.00027
Низкий

5.9 Medium

CVSS4

Дефекты

CWE-95

Связанные уязвимости

nvd
3 дня назад

The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.

EPSS

Процентиль: 7%
0.00027
Низкий

5.9 Medium

CVSS4

Дефекты

CWE-95