Metrics
Affected Vendors & Products
Wed, 09 Jul 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link wr841n Tp-link wr841n Firmware |
|
| CPEs | cpe:2.3:h:tp-link:wr841n:14.6:*:*:*:*:*:*:* cpe:2.3:h:tp-link:wr841n:14.8:*:*:*:*:*:*:* cpe:2.3:h:tp-link:wr841n:14:*:*:*:*:*:*:* cpe:2.3:o:tp-link:wr841n_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link
Tp-link wr841n Tp-link wr841n Firmware |
|
| Metrics |
cvssV3_1
|
Tue, 01 Jul 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 01 Jul 2025 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Sat, 19 Apr 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 231119 Rel.67074n allows adjacent attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. | A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. |
Fri, 18 Apr 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14 <= Build 231119 Rel.67074n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 231119 Rel.67074n allows adjacent attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. |
| Title | XSS in TP-Link TL-WR841N v14 Upnp page | XSS in TP-Link TL-WR841N v14/v14.6/v14.8 Upnp page |
| References |
|
Fri, 18 Apr 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N <=4.19 allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14 <= Build 231119 Rel.67074n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. |
| Title | XSS in TP-Link TL-WR841N Upnp page | XSS in TP-Link TL-WR841N v14 Upnp page |
| References |
|
Fri, 18 Apr 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
ssvc
|
Fri, 18 Apr 2025 00:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N <=4.19 allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. | |
| Title | XSS in TP-Link TL-WR841N Upnp page | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published: 2025-04-18T00:03:00.275Z
Updated: 2025-07-01T18:22:30.305Z
Reserved: 2025-02-07T03:19:33.744Z
Link: CVE-2025-25427
Updated: 2025-04-18T11:43:34.130Z
Status : Analyzed
Published: 2025-04-18T01:15:32.427
Modified: 2025-07-09T17:35:24.770
Link: CVE-2025-25427
No data.