{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T04:57:18.577","vulnerabilities":[{"cve":{"id":"CVE-2025-25427","sourceIdentifier":"f23511db-6c3e-4e32-a477-6aa17d310630","published":"2025-04-18T01:15:32.427","lastModified":"2025-07-09T17:35:24.770","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded."},{"lang":"es","value":"Una vulnerabilidad de cross-site scripting (XSS) almacenado en la página upnp.htm de la interfaz web de TP-Link WR841N v14/v14.6/v14.8 &lt;= Build 241230 Rel. 50788n permite a atacantes remotos inyectar código JavaScript arbitrario mediante la descripción de la asignación de puertos. Esto provoca la ejecución del payload de JavaScript al cargar la página upnp."}],"metrics":{"cvssMetricV40":[{"source":"f23511db-6c3e-4e32-a477-6aa17d310630","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.6,"baseSeverity":"HIGH","attackVector":"ADJACENT","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"PASSIVE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"LOW","subIntegrityImpact":"NONE","subAvailabilityImpact":"LOW","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.3,"impactScore":2.7}]},"weaknesses":[{"source":"f23511db-6c3e-4e32-a477-6aa17d310630","type":"Secondary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:wr841n_firmware:*:*:*:*:*:*:*:*","versionEndIncluding":"241230","matchCriteriaId":"545AE66C-FB29-4FB8-90DF-68B4EFBA2F33"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:wr841n:14:*:*:*:*:*:*:*","matchCriteriaId":"872BFADA-0745-4B29-9619-2731B81FC900"},{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:wr841n:14.6:*:*:*:*:*:*:*","matchCriteriaId":"D1220F78-6CCD-4612-95AB-17BFF3058F0F"},{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:wr841n:14.8:*:*:*:*:*:*:*","matchCriteriaId":"40DFDF61-DD3E-4744-8D81-85BDD4F66EA5"}]}]}],"references":[{"url":"https://github.com/slin99/2025-25427","source":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.tp-link.com/us/support/download/tl-wr841n/#Firmware","source":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Product"]},{"url":"https://www.tp-link.com/us/support/faq/4415/","source":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Vendor Advisory"]},{"url":"https://github.com/slin99/2025-25427/blob/master/readme.md","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["Exploit","Third Party Advisory"]}]}}]}