First published: Thu Feb 13 2025(Updated: )
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the 'ip' parameter at /userRpm/WanStaticIpV6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WR841ND | ||
All of | ||
Tp-link Tl-wr841nd Firmware | ||
TP-Link TL-WR841ND | =v11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25897 is classified as a critical severity vulnerability due to its potential for Denial of Service attacks.
To mitigate CVE-2025-25897, update the firmware of the TP-Link TL-WR841ND to the latest version provided by TP-Link.
The risks include Denial of Service (DoS) attacks that can disrupt network services on the affected TP-Link TL-WR841ND device.
CVE-2025-25897 specifically affects the TP-Link TL-WR841ND V11 version.
Yes, CVE-2025-25897 can be exploited remotely by sending a specially crafted packet to the vulnerable device.