Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q8h5-chqq-p9j3

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.

On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.

EPSS

Процентиль: 40%
0.00185
Низкий

Дефекты

CWE-74

Связанные уязвимости

CVSS3: 4.8
nvd
больше 5 лет назад

On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.

EPSS

Процентиль: 40%
0.00185
Низкий

Дефекты

CWE-74