// For flags

CVE-2025-53714

TP-Link TL-WR841N WzdWlanSiteSurveyRpm_AP.htm buffer overflow

Severity Score

6.9
*CVSS v4

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

A vulnerability has been found in TP-Link TL-WR841N V11. The vulnerability exists in the /userRpm/WzdWlanSiteSurveyRpm_AP.htm file due to missing input parameter validation, which may lead to the buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.

Se ha detectado una vulnerabilidad en TP-Link TL-WR841N V11. La vulnerabilidad se encuentra en el archivo /userRpm/WzdWlanSiteSurveyRpm_AP.htm debido a la omisión de la validación de los parámetros de entrada, lo que puede provocar un desbordamiento del búfer que provoque un bloqueo del servicio web y una denegación de servicio (DoS). El ataque puede ejecutarse en remoto. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Attack Requirements
None
Privileges Required
High
User Interaction
None
System
Vulnerable | Subsequent
Confidentiality
None
None
Integrity
None
None
Availability
High
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2025-07-09 CVE Reserved
  • 2025-07-29 CVE Published
  • 2025-08-01 CVE Updated
  • 2025-08-04 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
  • CAPEC-469: HTTP DoS
References (1)
URL Tag Source
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Tp-link
Search vendor "Tp-link"
Tl-wr841n Firmware
Search vendor "Tp-link" for product "Tl-wr841n Firmware"
<= 160325
Search vendor "Tp-link" for product "Tl-wr841n Firmware" and version " <= 160325"
-
Affected
in Tp-link
Search vendor "Tp-link"
Tl-wr841n
Search vendor "Tp-link" for product "Tl-wr841n"
11
Search vendor "Tp-link" for product "Tl-wr841n" and version "11"
-
Safe