- Description
- A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the pskSecret parameter at /userRpm/WlanSecurityRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
- nvd@nist.gov
- CWE-787
- Hype score
- Not currently trending
🚨 CVE-2025-25898 🔴 HIGH (7.5) 🏢 Unknown Vendor - Unknown Product 🏗️ Unknown Version 🔗 https://t.co/ScD3OXlLh8 #CyberCron #VulnAlert https://t.co/vh2pHMTxJL
@cybercronai
17 Feb 2025
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-25898 A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the pskSecret parameter at /userRpm/WlanSecurityRpm.htm. This vulnerability allows attack… https://t.co/kRB5brAvTI
@CVEnew
13 Feb 2025
177 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
New post from https://t.co/uXvPWJy6tj (CVE-2025-25898 | TP-LINK TL-WR841ND Packet WlanSecurityRpm.htm pskSecret denial of service) has been published on https://t.co/TOMIPwjiG4
@WolfgangSesin
13 Feb 2025
8 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:tp-link:tl-wr841nd_firmware:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "60843636-698C-4000-84CB-9D441601EDE2"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:tp-link:tl-wr841nd:v11:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "0B6B17A5-94C4-4B4C-998A-B0B7B7FADB21"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]