Summary
Detail | |||
---|---|---|---|
Vendor | Tp-Link | First view | 2020-04-01 |
Product | nc450 Firmware | Last view | 2020-06-17 |
Version | 1.5.0 | Type | Os |
Update | 181022 | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:tp-link:nc450_firmware |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.8 | 2020-06-17 | CVE-2020-13224 | TP-LINK NC200 devices through 2.1.10 build 200401, NC210 devices through 1.0.10 build 200401, NC220 devices through 1.3.1 build 200401, NC230 devices through 1.3.1 build 200401, NC250 devices through 1.3.1 build 200401, NC260 devices through 1.5.3 build_200401, and NC450 devices through 1.5.4 build 200401 have a Buffer Overflow |
5.3 | 2020-04-01 | CVE-2020-11445 | TP-Link cloud cameras through 2020-02-09 allow remote attackers to bypass authentication and obtain sensitive information via vectors involving a Wi-Fi session with GPS enabled, aka CNVD-2020-04855. |
7.5 | 2020-04-01 | CVE-2020-10231 | TP-Link NC200 through 2.1.8_Build_171109, NC210 through 1.0.9_Build_171214, NC220 through 1.3.0_Build_180105, NC230 through 1.3.0_Build_171205, NC250 through 1.3.0_Build_171205, NC260 through 1.5.1_Build_190805, and NC450 through 1.5.0_Build_181022 devices allow a remote NULL Pointer Dereference. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
50% (1) | CWE-476 | NULL Pointer Dereference |
50% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |