Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| TP-Link Systems Inc. | VIGI C485 V1 | 0 ~ 3.1.1 Build 251124 Rel.50371n | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | CVE-2026-1457 is an authenticated buffer overflow vulnerability in the web API of TP-Link VIGI C385 V1. This vulnerability allows authenticated attackers to perform remote code execution (RCE). | https://github.com/ii4gsp/CVE-2026-1457 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-15545 | Insufficient Backup File Upload Input Validation on TP-Link Archer RE605X | |
| CVE-2025-15548 | Missing Application-Layer Encryption in Web Interface Endpoints on TP-Link VX800v | |
| CVE-2025-15543 | Read-Only Root Access via USB Storage Device in TP-Link VX800v | |
| CVE-2025-15541 | Access to System Files via SFTP on TP-Link VX800v | |
| CVE-2025-15542 | Denial of Service (DoS) of VoIP Communication on TP-Link VX800v | |
| CVE-2025-13399 | Insecure Encryption in Communication with the Web Interface on TP-Link VX800v |
No comments yet