A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11, triggered by the dnsserver1 and dnsserver2 parameters at /userRpm/WanSlaacCfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
References
Link | Resource |
---|---|
https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_5.pdf | Exploit Third Party Advisory |
https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_5.pdf | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
20 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_5.pdf - Exploit, Third Party Advisory |
18 Feb 2025, 14:57
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:h:tp-link:tl-wr841nd:v11:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr841nd_firmware:-:*:*:*:*:*:*:* |
|
CWE | CWE-787 | |
References | () https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_5.pdf - Exploit, Third Party Advisory | |
Summary |
|
|
First Time |
Tp-link tl-wr841nd
Tp-link tl-wr841nd Firmware Tp-link |
13 Feb 2025, 16:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-13 16:16
Updated : 2025-02-20 15:15
NVD link : CVE-2025-25901
Mitre link : CVE-2025-25901
CVE.ORG link : CVE-2025-25901
JSON object : View
Products Affected
tp-link
- tl-wr841nd_firmware
- tl-wr841nd
CWE
CWE-787
Out-of-bounds Write