All the vulnerabilites related to TP-Link Systems Inc. - TL-WR841N v14/v14.6/v14.8
cve-2025-25427
Vulnerability from cvelistv5
Published
2025-04-18 00:03
Modified
2025-04-19 00:33
Severity ?
EPSS score ?
Summary
XSS in TP-Link TL-WR841N v14/v14.6/v14.8 Upnp page
References
Impacted products
▼ | Vendor | Product |
---|---|---|
TP-Link Systems Inc. | TL-WR841N v14/v14.6/v14.8 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-25427", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-18T11:43:20.359854Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-18T12:01:46.163Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/slin99/2025-25427/blob/master/readme.md" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "upnp" ], "product": "TL-WR841N v14/v14.6/v14.8", "vendor": "TP-Link Systems Inc.", "versions": [ { "lessThanOrEqual": "Build 241230 Rel. 50788n", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "datePublic": "2025-04-18T00:13:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 \u0026lt;= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded." } ], "value": "A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 \u003c= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded." } ], "impacts": [ { "capecId": "CAPEC-63", "descriptions": [ { "lang": "en", "value": "CAPEC-63 Cross-Site Scripting (XSS)" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "ADJACENT", "baseScore": 8.6, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "LOW", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:N/SA:L", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-19T00:33:01.269Z", "orgId": "f23511db-6c3e-4e32-a477-6aa17d310630", "shortName": "TPLink" }, "references": [ { "url": "https://github.com/slin99/2025-25427" }, { "url": "https://www.tp-link.com/en/support/download/tl-wr841n/#Firmware" }, { "url": "https://www.tp-link.com/us/support/download/tl-wr841n/#Firmware" } ], "source": { "discovery": "UNKNOWN" }, "title": "XSS in TP-Link TL-WR841N v14/v14.6/v14.8 Upnp page", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630", "assignerShortName": "TPLink", "cveId": "CVE-2025-25427", "datePublished": "2025-04-18T00:03:00.275Z", "dateReserved": "2025-02-07T03:19:33.744Z", "dateUpdated": "2025-04-19T00:33:01.269Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }