Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2020-14965

EPSS 0.18% · P40
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2020-14965

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
TP-Link TL-WR740N和TL-WR740ND 注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TP-Link TL-WR740N和TP-Link TL-WR740ND都是中国普联(TP-Link)公司的一款无线路由器。 TP-Link TL-WR740N v4版本和TL-WR740ND v4版本中存在安全漏洞。攻击者可借助targets_lists_name或hosts_lists_name利用该漏洞注入HTML代码并更改目标页面和站点的HTML上下文。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2020-14965

#POC DescriptionSource LinkShenlong Link
1TP-LINK Multiple HTML Injection Vulnerabilities https://github.com/g-rubert/CVE-2020-14965POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2020-14965

登录查看更多情报信息。

Same Patch Batch · n/a · 2020-06-23 · 18 CVEs total

CVE-2020-14976Galaxy Technologies GNS3 server ubridge 信息泄露漏洞
CVE-2020-14940TuxGuitar 代码问题漏洞
CVE-2020-14939FreedroidRPG 输入验证错误漏洞
CVE-2020-14938FreedroidRPG 缓冲区错误漏洞
CVE-2020-14993多款DrayTek产品缓冲区错误漏洞
CVE-2020-14971Pi-hole 代码注入漏洞
CVE-2020-9438Tinxy Door Lock 安全漏洞
CVE-2020-14978F-Secure SAFE 安全漏洞
CVE-2020-14977F-Secure SAFE 输入验证错误漏洞
CVE-2020-12033Rockwell Automation FactoryTalk Services Platform 输入验证错误漏洞
CVE-2020-14975IOBit Unlocker 安全漏洞
CVE-2020-14974IOBit Unlocker 安全漏洞
CVE-2020-14073Paessler PRTG Network Monitor 跨站脚本漏洞
CVE-2020-13157VINADES NukeViet 跨站请求伪造漏洞
CVE-2020-13156VINADES NukeViet 跨站请求伪造漏洞
CVE-2020-13155VINADES NukeViet 跨站请求伪造漏洞
CVE-2020-12021OSIsoft PI Web API 跨站脚本漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2020-14965

No comments yet


Leave a comment