First published: Fri Apr 18 2025(Updated: )
A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.
Credit: f23511db-6c3e-4e32-a477-6aa17d310630
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link WR841N | <=Build 241230 Rel. 50788n | |
TP-Link TL-WR841ND Firmware | <=Build 241230 Rel. 50788n |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25427 has been classified as a high severity vulnerability due to its potential for remote code execution through stored cross-site scripting.
To fix CVE-2025-25427, upgrade your TP-Link WR841N or TL-WR841N to a version higher than 4.19.
CVE-2025-25427 can facilitate cross-site scripting attacks, allowing attackers to execute arbitrary JavaScript code remotely.
CVE-2025-25427 affects TP-Link WR841N and TL-WR841N devices running firmware version 4.19 or earlier.
CVE-2025-25427 can be exploited by injecting malicious JavaScript into the UPnP page's port mapping description, triggering execution when the page loads.