Metrics
Affected Vendors & Products
Tue, 21 Oct 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 04 Sep 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link archer C7 Tp-link archer C7 Firmware Tp-link tl-wr841n Tp-link tl-wr841n Firmware Tp-link tl-wr841nd Tp-link tl-wr841nd Firmware |
|
| CPEs | cpe:2.3:h:tp-link:archer_c7:2.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr841n:v9:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr841nd:9:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_c7_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr841n_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr841nd_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link
Tp-link archer C7 Tp-link archer C7 Firmware Tp-link tl-wr841n Tp-link tl-wr841n Firmware Tp-link tl-wr841nd Tp-link tl-wr841nd Firmware |
|
| Metrics |
cvssV3_1
|
Wed, 03 Sep 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Fri, 29 Aug 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 29 Aug 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both products have reached the status of EOL (end-of-life). It's recommending to purchase the new product to ensure better performance and security. If replacement is not an option in the short term, please use the second reference link to download and install the patch(es). | |
| Title | Authenticated RCE via Parental Control command injection | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published: 2025-08-29T17:30:33.700Z
Updated: 2025-10-21T22:45:20.031Z
Reserved: 2025-08-23T00:15:09.238Z
Link: CVE-2025-9377
Updated: 2025-08-29T18:16:09.221Z
Status : Modified
Published: 2025-08-29T18:15:43.220
Modified: 2025-10-21T23:17:11.550
Link: CVE-2025-9377
No data.