A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.
References
Link | Resource |
---|---|
https://github.com/slin99/2025-25427 | Exploit Third Party Advisory |
https://www.tp-link.com/us/support/download/tl-wr841n/#Firmware | Product |
https://www.tp-link.com/us/support/faq/4415/ | Vendor Advisory |
https://github.com/slin99/2025-25427/blob/master/readme.md | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
09 Jul 2025, 17:35
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tp-link wr841n Firmware
Tp-link wr841n Tp-link |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.4 |
CPE | cpe:2.3:o:tp-link:wr841n_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:wr841n:14.6:*:*:*:*:*:*:* cpe:2.3:h:tp-link:wr841n:14.8:*:*:*:*:*:*:* cpe:2.3:h:tp-link:wr841n:14:*:*:*:*:*:*:* |
|
References | () https://github.com/slin99/2025-25427 - Exploit, Third Party Advisory | |
References | () https://www.tp-link.com/us/support/download/tl-wr841n/#Firmware - Product | |
References | () https://www.tp-link.com/us/support/faq/4415/ - Vendor Advisory | |
References | () https://github.com/slin99/2025-25427/blob/master/readme.md - Exploit, Third Party Advisory |
01 Jul 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary |
|
19 Apr 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. |
18 Apr 2025, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 231119 Rel.67074n allows adjacent attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. |
18 Apr 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14 <= Build 231119 Rel.67074n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. | |
References |
|
18 Apr 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
18 Apr 2025, 01:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-18 01:15
Updated : 2025-07-09 17:35
NVD link : CVE-2025-25427
Mitre link : CVE-2025-25427
CVE.ORG link : CVE-2025-25427
JSON object : View
Products Affected
tp-link
- wr841n_firmware
- wr841n
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')