First published: Thu Feb 13 2025(Updated: )
A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11, triggered by the dnsserver1 and dnsserver2 parameters at /userRpm/WanSlaacCfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WR841ND | ||
All of | ||
Tp-link Tl-wr841nd Firmware | ||
TP-Link TL-WR841ND | =v11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25901 is categorized as a high-severity vulnerability due to its potential to cause Denial of Service.
To mitigate CVE-2025-25901, update the firmware of the TP-Link TL-WR841ND to the latest version provided by the vendor.
CVE-2025-25901 can lead to a Denial of Service, causing the device to crash and become unresponsive.
CVE-2025-25901 was identified recently, drawing attention to the security of the TP-Link TL-WR841ND.
The buffer overflow in CVE-2025-25901 is triggered by the dnsserver1 and dnsserver2 parameters at the specified URL.