Metrics
Affected Vendors & Products
Wed, 09 Jul 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tp-link
Tp-link wr841n Tp-link wr841n Firmware |
|
CPEs | cpe:2.3:h:tp-link:wr841n:14.6:*:*:*:*:*:*:* cpe:2.3:h:tp-link:wr841n:14.8:*:*:*:*:*:*:* cpe:2.3:h:tp-link:wr841n:14:*:*:*:*:*:*:* cpe:2.3:o:tp-link:wr841n_firmware:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Tp-link
Tp-link wr841n Tp-link wr841n Firmware |
|
Metrics |
cvssV3_1
|
Tue, 01 Jul 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 01 Jul 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sat, 19 Apr 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 231119 Rel.67074n allows adjacent attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. | A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. |
Fri, 18 Apr 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14 <= Build 231119 Rel.67074n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 231119 Rel.67074n allows adjacent attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. |
Title | XSS in TP-Link TL-WR841N v14 Upnp page | XSS in TP-Link TL-WR841N v14/v14.6/v14.8 Upnp page |
References |
|
Fri, 18 Apr 2025 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N <=4.19 allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14 <= Build 231119 Rel.67074n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. |
Title | XSS in TP-Link TL-WR841N Upnp page | XSS in TP-Link TL-WR841N v14 Upnp page |
References |
|
Fri, 18 Apr 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
ssvc
|
Fri, 18 Apr 2025 00:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N <=4.19 allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. | |
Title | XSS in TP-Link TL-WR841N Upnp page | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2025-07-01T18:22:30.305Z
Reserved: 2025-02-07T03:19:33.744Z
Link: CVE-2025-25427

Updated: 2025-04-18T11:43:34.130Z

Status : Analyzed
Published: 2025-04-18T01:15:32.427
Modified: 2025-07-09T17:35:24.770
Link: CVE-2025-25427

No data.