On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.
2020-06-23T14:15:12.823
2024-11-21T05:04:31.830
Modified
CVSSv3.1: 4.8 (MEDIUM)
AV:N/AC:M/Au:S/C:N/I:P/A:N
6.8
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | tp-link | tl-wr740n_firmware | - | Yes |
Hardware | tp-link | tl-wr740n | 4.0 | No |
Operating System | tp-link | tl-wr740nd_firmware | - | Yes |
Hardware | tp-link | tl-wr740nd | 4.0 | No |