Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

TP-Link — Vulnerabilities & Security Advisories 110

Browse all 110 CVE security advisories affecting TP-Link. AI-powered Chinese analysis, POCs, and references for each vulnerability.

TP-Link operates primarily as a manufacturer of consumer networking hardware, including wireless routers, switches, and smart home devices. Its product portfolio frequently exhibits historical vulnerabilities, with recorded Common Vulnerabilities and Exposures (CVEs) often involving remote code execution, cross-site scripting, and privilege escalation flaws. These security issues typically stem from inadequate input validation, hardcoded credentials, and unpatched firmware components within embedded web interfaces. Notable incidents have included the discovery of backdoors and command injection points that allowed attackers to gain administrative control over affected devices. The sheer volume of documented CVEs highlights systemic challenges in the company’s software development lifecycle and patch management processes. While the devices remain ubiquitous in residential and small business environments, their security posture has drawn scrutiny from researchers who emphasize the risks associated with default configurations and delayed security updates for legacy hardware models.

CVE IDTitleCVSSSeverityPublished
CVE-2023-36489 TP-LINK 多款产品操作系统命令注入漏洞 — TL-WR802N 8.8 -2023-09-06
CVE-2023-31188 TP-LINK Archer C50 操作系统命令注入漏洞 — Archer C50 8.0 -2023-09-06
CVE-2023-32619 TP-LINK Archer C50 信任管理问题漏洞 — Archer C50 8.8 -2023-09-06
CVE-2023-37284 TP-LINK Archer C2 授权问题漏洞 — Archer C20 8.8 -2023-09-06
CVE-2023-38563 TP-LINK Archer C1200 操作系统命令注入漏洞 — Archer C1200 8.8 -2023-09-06
CVE-2023-38568 TP-LINK Archer A10 操作系统命令注入漏洞 — Archer A10 8.8 -2023-09-06
CVE-2023-38588 TP-LINK Archer C3150 操作系统命令注入漏洞 — Archer C3150 8.0 -2023-09-06
CVE-2023-39224 TP-LINK Archer C7 操作系统命令注入漏洞 — Archer C5 8.0 -2023-09-06
CVE-2023-39935 TP-LINK Archer C5400 操作系统命令注入漏洞 — Archer C5400 8.0 -2023-09-06
CVE-2023-40193 TP-LINK Deco M4 操作系统命令注入漏洞 — Deco M4 8.0 -2023-09-06
CVE-2023-40357 TP-LINK Archer 操作系统命令注入漏洞 — Archer AX50 8.0 -2023-09-06
CVE-2023-40531 TP-LINK Archer AX6000 操作系统命令注入漏洞 — Archer AX6000 8.0 -2023-09-06
CVE-2023-2646 TP-Link Archer C7v2 GET Request Parameter denial of service — Archer C7v2CWE-404 4.5 Medium2023-05-11
CVE-2022-42433 TP-LINK TL-WR841N 操作系统命令注入漏洞 — TL-WR841NCWE-78 8.0 -2023-03-29
CVE-2022-43635 TP-LINK TL-WR940N 安全漏洞 — TL-WR940NCWE-303 6.5 -2023-03-29
CVE-2022-43636 TP-LINK TL-WR940N 安全特征问题漏洞 — TL-WR940NCWE-330 8.8 -2023-03-29
CVE-2022-0650 TP-Link TL-WR940N 缓冲区错误漏洞 — TL-WR940NCWE-121 8.0 -2023-03-28
CVE-2022-24352 TP-LINK AC1750 缓冲区错误漏洞 — AC1750CWE-125 8.8 -2023-03-28
CVE-2022-24353 TP-LINK AC1750 缓冲区错误漏洞 — AC1750CWE-125 8.8 -2023-03-28
CVE-2022-24972 TP-LINK TL-WR940N 访问控制错误漏洞 — TL-WR940NCWE-284 6.5 -2023-03-28
CVE-2022-24973 TP-Link TL-WR940N 安全漏洞 — TL-WR940NCWE-121 8.0 -2023-03-28
CVE-2023-0936 TP-Link Archer C50 Web Management Interface denial of service — Archer C50CWE-404 6.5 Medium2023-02-21
CVE-2023-22303 TP-LINK TL-SG105PE(UN) 授权问题漏洞 — TP-Link SG105PE 9.8 -2023-01-17
CVE-2022-4498 A vulnerable HTTP Basic Authentication process in TP-Link routers, Archer C5 and WR710N-V1, is susceptible to either a DoS or an arbitrary code execution via any interface. — WR710N 9.8 -2023-01-11
CVE-2022-4499 The strcmp function in TP-Link routers, Archer C5 and WR710N-V1, used for checking credentials in httpd, is susceptible to a side-channel attack. — WR710N 7.5 -2023-01-11
CVE-2022-41783 TP-LINK RE300 安全漏洞 — TP-Link RE300 V1 5.5 -2022-12-07
CVE-2022-4296 TP-Link TL-WR740N ARP resource consumption — TL-WR740NCWE-404 6.5 Medium2022-12-06
CVE-2021-4045 TP-LINK Tapo C200 remote code execution vulnerability — Tapo C200CWE-77 9.8 Critical2022-03-07
CVE-2022-24355 Tp-link TP-Link TL-WR940N 安全漏洞 — TL-WR940NCWE-121 8.8 -2022-02-18
CVE-2022-24354 Tp-link AC1750 输入验证错误漏洞 — AC1750CWE-190 8.8 -2022-02-18

This page lists every published CVE security advisory associated with TP-Link. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.