EUVD-2025-18451

| CVE-2025-6151 HIGH
2025-06-17 f23511db-6c3e-4e32-a477-6aa17d310630
8.2
CVSS 4.0
Share

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
None

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 22:15 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 22:15 euvd
EUVD-2025-18451
PoC Detected
Jul 15, 2025 - 19:15 vuln.today
Public exploit code
CVE Published
Jun 17, 2025 - 01:15 nvd
HIGH 8.2

Description

A vulnerability has been found in TP-Link TL-WR940N V4 and TL-WR841N V11. Affected by this issue is some unknown functionality of the file /userRpm/WanSlaacCfgRpm.htm, which may lead to buffer overflow. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.

Analysis

Buffer overflow vulnerability in TP-Link TL-WR940N V4 and TL-WR841N V11 routers, exploitable remotely through the /userRpm/WanSlaacCfgRpm.htm endpoint. An attacker with high privileges can trigger memory corruption leading to availability impact (denial of service) or potential system compromise. This vulnerability affects end-of-life products no longer receiving vendor support, significantly limiting remediation options.

Technical Context

The vulnerability exists in CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), a classic buffer overflow class affecting memory safety. The vulnerable endpoint /userRpm/WanSlaacCfgRpm.htm handles SLAAC (Stateless Address AutoConfiguration) configuration in IPv6, likely processing user-supplied input without proper bounds checking. TP-Link router firmware typically uses embedded Linux with custom CGI handlers; this specific file is part of the web-based management interface. The affected products are: TP-Link TL-WR940N V4 (CPE: cpe:2.3:h:tp-link:tl-wr940n:4:*:*:*:*:*:*:*) and TP-Link TL-WR841N V11 (CPE: cpe:2.3:h:tp-link:tl-wr841n:11:*:*:*:*:*:*:*). Both are residential-grade wireless routers that reached end-of-life several years ago.

Affected Products

- product: TP-Link TL-WR940N; version: V4; cpe: cpe:2.3:h:tp-link:tl-wr940n:4:*:*:*:*:*:*:*; end_of_life: True - product: TP-Link TL-WR841N; version: V11; cpe: cpe:2.3:h:tp-link:tl-wr841n:11:*:*:*:*:*:*:*; end_of_life: True

Remediation

primary: Hardware replacement; description: No patches will be released for these end-of-life products. Organizations should plan migration to current TP-Link models or alternative vendors with active security support. mitigation: Network segmentation; description: Restrict access to router management interface to trusted administrative networks only. Disable remote management (disable HTTP/HTTPS WAN access to admin interface) if supported. mitigation: Access control; description: Change default administrative credentials immediately. Ensure strong, unique passwords for all administrative accounts to reduce unauthorized access risk. mitigation: Monitoring; description: Monitor router logs for unusual administrative login attempts or configuration changes to /userRpm/WanSlaacCfgRpm.htm endpoint.

Priority Score

62
Low Medium High Critical
KEV: 0
EPSS: +0.5
CVSS: +41
POC: +20

Share

EUVD-2025-18451 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy