First published: Tue Jun 23 2020(Updated: )
On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr740n Firmware | ||
TP-Link TL-WR740N | =4.0 | |
Tp-link Tl-wr740nd Firmware | ||
Tp-link Tl-wr740nd | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14965 is a vulnerability found in TP-Link TL-WR740N v4 and TL-WR740ND v4 devices that allows an attacker with access to the admin panel to inject HTML code and change the HTML context of the target pages and stations in the access-control settings.
An attacker can exploit CVE-2020-14965 by injecting HTML code and modifying the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name.
The severity rating of CVE-2020-14965 is medium, with a severity value of 4.8.
TP-Link TL-WR740N v4 and TL-WR740ND v4 devices are affected by CVE-2020-14965.
At the moment, there is no official fix available for CVE-2020-14965. It is recommended to follow the provided reference link for any updates or patches.