First published: Wed Apr 16 2025(Updated: )
SQL Injection vulnerability exists in the TP-Link TL-WR840N router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link WR840N | ||
All of | ||
TP-Link TL-WR840N Firmware | =1.0 | |
TP-Link WR840N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-29649 has a high severity level due to its potential for allowing unauthorized access to sensitive data.
To fix CVE-2025-29649, update the TP-Link TL-WR840N router to the latest firmware version provided by TP-Link.
The potential impacts of CVE-2025-29649 include unauthorized data access and manipulation through SQL injection.
Users of the TP-Link TL-WR840N router running version 1.0 are affected by CVE-2025-29649.
CVE-2025-29649 is a notable vulnerability as SQL injection flaws are commonly exploited in web applications and devices.