CVE-2026-3227

MEDIUM

Authenticated Command Injection on TP-Link TL-WR802N, TL-WR841N and TL-WR840N

Title source: cna
STIX 2.1

Description

A command injection vulnerability was identified in TP-Link TL-WR802N v4, TL-WR841N v14, and TL-WR840N v6 due to improper neutralization of special elements used in an OS command. In the router configuration import function allows an authenticated attacker to upload a crafted configuration file that results in execution of OS commands with root privileges during port-trigger processing. Successful exploitation allows an authenticated attacker to execute system commands with root privileges, leading to full device compromise.

Scores

CVSS v3 6.8
EPSS 0.0031
EPSS Percentile 54.3%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (6)
TP Link Systems Inc./TL-WR840N v6 < V6_260304
tp-link/tl-wr802n_firmware < 260304
tp-link/tl-wr840n_firmware < 260304
tp-link/tl-wr841n_firmware < 260303
TP-Link Systems Inc./TL-WR802N v4 < V4_260304
TP-Link Systems Inc./TL-WR841N v14 < V14_260303
Published Mar 16, 2026
Tracked Since Mar 16, 2026