Metrics
Affected Vendors & Products
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 19:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Metrics |
cvssV2_0
|
Tue, 15 Jul 2025 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as critical, has been found in TP-Link TL-WR940N V4. Affected by this issue is some unknown functionality of the file /userRpm/WanSlaacCfgRpm.htm. The manipulation of the argument dnsserver1 leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. | A vulnerability has been found in TP-Link TL-WR940N V4 and TL-WR841N V11. Affected by this issue is some unknown functionality of the file /userRpm/WanSlaacCfgRpm.htm, which may lead to buffer overflow. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer. |
Title | TP-Link TL-WR940N WanSlaacCfgRpm.htm buffer overflow | TP-Link TL-WR940N, TL-WR841N WanSlaacCfgRpm.htm buffer overflow |
References |
| |
Metrics |
cvssV3_0
|
cvssV2_0
|
Thu, 03 Jul 2025 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as critical, has been found in TP-Link TL-WR940N V4. Affected by this issue is some unknown functionality of the file /userRpm/WanSlaacCfgRpm.htm. The manipulation of the argument dnsserver1 leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | A vulnerability, which was classified as critical, has been found in TP-Link TL-WR940N V4. Affected by this issue is some unknown functionality of the file /userRpm/WanSlaacCfgRpm.htm. The manipulation of the argument dnsserver1 leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer. |
Thu, 19 Jun 2025 01:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tp-link
Tp-link tl-wr940n Tp-link tl-wr940n Firmware |
|
CPEs | cpe:2.3:h:tp-link:tl-wr940n:v4:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr940n_firmware:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Tp-link
Tp-link tl-wr940n Tp-link tl-wr940n Firmware |
Tue, 17 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 17 Jun 2025 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A vulnerability, which was classified as critical, has been found in TP-Link TL-WR940N V4. Affected by this issue is some unknown functionality of the file /userRpm/WanSlaacCfgRpm.htm. The manipulation of the argument dnsserver1 leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. | |
Title | TP-Link TL-WR940N WanSlaacCfgRpm.htm buffer overflow | |
Weaknesses | CWE-119 CWE-120 |
|
References |
| |
Metrics |
cvssV2_0
|

Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2025-07-15T18:49:38.224Z
Reserved: 2025-06-15T18:40:11.295Z
Link: CVE-2025-6151

Updated: 2025-06-17T14:34:47.666Z

Status : Modified
Published: 2025-06-17T01:15:23.313
Modified: 2025-07-15T19:15:23.380
Link: CVE-2025-6151

No data.