A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.
History

Sat, 19 Apr 2025 00:45:00 +0000

Type Values Removed Values Added
Description A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 231119 Rel.67074n allows adjacent attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.

Fri, 18 Apr 2025 21:45:00 +0000

Type Values Removed Values Added
Description A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14 <= Build 231119 Rel.67074n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 231119 Rel.67074n allows adjacent attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.
Title XSS in TP-Link TL-WR841N v14 Upnp page XSS in TP-Link TL-WR841N v14/v14.6/v14.8 Upnp page
References

Fri, 18 Apr 2025 19:45:00 +0000

Type Values Removed Values Added
Description A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N <=4.19 allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded. A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14 <= Build 231119 Rel.67074n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.
Title XSS in TP-Link TL-WR841N Upnp page XSS in TP-Link TL-WR841N v14 Upnp page
References

Fri, 18 Apr 2025 12:15:00 +0000

Type Values Removed Values Added
References
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 18 Apr 2025 00:30:00 +0000

Type Values Removed Values Added
Description A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N <=4.19 allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.
Title XSS in TP-Link TL-WR841N Upnp page
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:N/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2025-04-19T00:33:01.269Z

Reserved: 2025-02-07T03:19:33.744Z

Link: CVE-2025-25427

cve-icon Vulnrichment

Updated: 2025-04-18T11:43:34.130Z

cve-icon NVD

Status : Received

Published: 2025-04-18T01:15:32.427

Modified: 2025-04-19T01:15:44.747

Link: CVE-2025-25427

cve-icon Redhat

No data.