Description
A vulnerability has been found in TP-Link TL-WR841N v11, TL-WR842ND v2 and TL-WR494N v3. The vulnerability exists in the /userRpm/WlanNetworkRpm.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
References (1)
Core 1
Core References
Vendor Advisory vendor-advisory
https://www.tp-link.com/us/support/faq/4569/
Scores
CVSS v3
7.5
EPSS
0.0009
EPSS Percentile
26.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-119
CWE-120
Status
published
Products (4)
TP Link Systems Inc./TL-WR842ND v2
< V2_150514
TP Link Systems Inc./TL-WR949N v3
< 3.18.1 Build 1711151
tp-link/tl-wr841n_firmware
< 160325
TP-Link Systems INC./TL-WR841N v11
< 160325
Published
Jul 29, 2025
Tracked Since
Feb 18, 2026