Description
On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-7098 | On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator. |
References
| Link | Providers |
|---|---|
| https://github.com/g-rubert/CVE-2020-14965 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:00:51.997Z
Reserved: 2020-06-22T00:00:00.000Z
Link: CVE-2020-14965
No data.
Status : Modified
Published: 2020-06-23T14:15:12.823
Modified: 2024-11-21T05:04:31.830
Link: CVE-2020-14965
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD