On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://github.com/g-rubert/CVE-2020-14965 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:00:51.997Z
Reserved: 2020-06-22T00:00:00
Link: CVE-2020-14965

No data.

Status : Modified
Published: 2020-06-23T14:15:12.823
Modified: 2024-11-21T05:04:31.830
Link: CVE-2020-14965

No data.