We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-53711

TP-Link TL-WR841N WlanNetworkRpm.htm buffer overflow



Description

A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WlanNetworkRpm.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.

Reserved 2025-07-09 | Published 2025-07-29 | Updated 2025-07-29 | Assigner TPLink


MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer

Product status

Default status
unaffected

Any version
affected

References

www.tp-link.com/us/support/faq/4569/ vendor-advisory

cve.org (CVE-2025-53711)

nvd.nist.gov (CVE-2025-53711)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-53711

Support options

Helpdesk Chat, Email, Knowledgebase