Description
On TP-Link TL-WR740N v4 and TL-WR740ND v4 devices, an attacker with access to the admin panel can inject HTML code and change the HTML context of the target pages and stations in the access-control settings via targets_lists_name or hosts_lists_name. The vulnerability can also be exploited through a CSRF, requiring no authentication as an administrator.
Exploits (1)
References (1)
Core 1
Core References
Third Party Advisory x_refsource_misc
https://github.com/g-rubert/CVE-2020-14965
Scores
CVSS v3
4.8
EPSS
0.0019
EPSS Percentile
39.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N
Details
CWE
CWE-79
Status
published
Products (2)
tp-link/tl-wr740n_firmware
tp-link/tl-wr740nd_firmware
Published
Jun 23, 2020
Tracked Since
Feb 18, 2026