Description
On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.
Published: 2020-06-23
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-7098 On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.
References
History

No history.

Subscriptions

Tp-link Tl-wr740n Tl-wr740n Firmware Tl-wr740nd Tl-wr740nd Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T13:00:51.997Z

Reserved: 2020-06-22T00:00:00.000Z

Link: CVE-2020-14965

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-06-23T14:15:12.823

Modified: 2024-11-21T05:04:31.830

Link: CVE-2020-14965

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses