CVE-2025-25427

A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:wr841n_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:h:tp-link:wr841n:14:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr841n:14.6:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr841n:14.8:*:*:*:*:*:*:*

History

09 Jul 2025, 17:35

Type Values Removed Values Added
First Time Tp-link wr841n Firmware
Tp-link wr841n
Tp-link
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CPE cpe:2.3:o:tp-link:wr841n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr841n:14.6:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr841n:14.8:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:wr841n:14:*:*:*:*:*:*:*
References () https://github.com/slin99/2025-25427 - () https://github.com/slin99/2025-25427 - Exploit, Third Party Advisory
References () https://www.tp-link.com/us/support/download/tl-wr841n/#Firmware - () https://www.tp-link.com/us/support/download/tl-wr841n/#Firmware - Product
References () https://www.tp-link.com/us/support/faq/4415/ - () https://www.tp-link.com/us/support/faq/4415/ - Vendor Advisory
References () https://github.com/slin99/2025-25427/blob/master/readme.md - () https://github.com/slin99/2025-25427/blob/master/readme.md - Exploit, Third Party Advisory

01 Jul 2025, 19:15

Type Values Removed Values Added
References
  • {'url': 'https://www.tp-link.com/en/support/download/tl-wr841n/#Firmware', 'source': 'f23511db-6c3e-4e32-a477-6aa17d310630'}
  • () https://www.tp-link.com/us/support/faq/4415/ -
Summary
  • (es) Una vulnerabilidad de cross-site scripting (XSS) almacenado en la página upnp.htm de la interfaz web de TP-Link WR841N v14/v14.6/v14.8 &lt;= Build 241230 Rel. 50788n permite a atacantes remotos inyectar código JavaScript arbitrario mediante la descripción de la asignación de puertos. Esto provoca la ejecución del payload de JavaScript al cargar la página upnp.

19 Apr 2025, 01:15

Type Values Removed Values Added
Summary (en) A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 231119 Rel.67074n allows adjacent attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. (en) A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.

18 Apr 2025, 22:15

Type Values Removed Values Added
References
  • () https://www.tp-link.com/us/support/download/tl-wr841n/#Firmware -
Summary (en) A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14 <= Build 231119 Rel.67074n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. (en) A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 231119 Rel.67074n allows adjacent attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.

18 Apr 2025, 20:15

Type Values Removed Values Added
Summary (en) A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N <=4.19 allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. (en) A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14 <= Build 231119 Rel.67074n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.
References
  • () https://www.tp-link.com/en/support/download/tl-wr841n/#Firmware -

18 Apr 2025, 12:15

Type Values Removed Values Added
References
  • () https://github.com/slin99/2025-25427/blob/master/readme.md -

18 Apr 2025, 01:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-04-18 01:15

Updated : 2025-07-09 17:35


NVD link : CVE-2025-25427

Mitre link : CVE-2025-25427

CVE.ORG link : CVE-2025-25427


JSON object : View

Products Affected

tp-link

  • wr841n_firmware
  • wr841n
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')