At TP-Link, customer security comes first. That’s why we work diligently to ensure that our products include the highest level of security features, with firmware and hardware that protect customers and their devices from the latest threats.
To ensure that vulnerabilities are not maliciously exploited, TP-Link will not announce security vulnerabilities and details until fixes are made.
This form is ONLY for reporting Product Security or Vulnerability issues.
Security engineers and other technical experts can click here to submit feedback about our security features. Your information will be handled by our network security engineers. You will receive a reply in 1-3 working days.
Since vulnerability information is relatively sensitive, we strongly recommend that when reporting a potential security vulnerability to TP-Link, please use our public PGP key (Fingerprint: 49E2 CEAB ABD1 CAED E934 818E 4D1C F72C 29C9 C881) for encryption and submit technical details.
Bulletin
[3348] Statement on Spring Framework RCE Vulnerability
[3347] Statement on Spring Framework RCE Vulnerability
[3279] Security Advisory for KCodes NetUSB Vulnerabilities
[3255] Statement on Apache Log4j2 Vulnerability
[2803] Buffer Overflow in pppd Vulnerability
[2278] GhostDNS Malware Security
[2276] Remote Exploitation Vulnerability
[2212] VPNFilter Malware Security
[2166] Fix for vulnerabilities of TL-WR740N & TL-WR940N
[1970] WPA2 Security (KRACKs) Vulnerability Statement
[1963] Notice of Fraudulent and non-TP-Link Affiliated Websites
[1859] Fixing the “Directory Traversal” security vulnerability for TL-WA701ND