{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T23:21:24.151","vulnerabilities":[{"cve":{"id":"CVE-2025-25899","sourceIdentifier":"cve@mitre.org","published":"2025-02-13T16:16:49.953","lastModified":"2025-06-20T17:26:06.423","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the 'gw' parameter at \/userRpm\/WanDynamicIpV6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet."},{"lang":"es","value":"Se descubrió una vulnerabilidad de desbordamiento de búfer en TP-Link TL-WR841ND V11 a través del parámetro 'gw' en \/userRpm\/WanDynamicIpV6CfgRpm.htm. Esta vulnerabilidad permite a los atacantes provocar una denegación de servicio (DoS) a través de un paquete manipulado."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:H\/PR:L\/UI:N\/S:C\/C:N\/I:N\/A:L","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":1.8,"impactScore":1.4}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-404"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:tl-wr841nd_v11_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"FA9094C6-F936-4CDF-B7F5-542DFB76A3C0"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:tl-wr841nd_v11:-:*:*:*:*:*:*:*","matchCriteriaId":"5F4E2ECB-786B-44C2-90FC-14FC73BDD0C3"}]}]}],"references":[{"url":"https:\/\/github.com\/2664521593\/mycve\/blob\/main\/TP-Link\/BOF_in_TP-Link_TL-WR841ND-V11_2.pdf","source":"cve@mitre.org","tags":["Broken Link"]}]}}]}