Statement on the denial-of-service vulnerability due to the buffer overflow on TL-WR841N (CVE-2025-53711, CVE-2025-53712, CVE-2025-53713, CVE-2025-53714, CVE-2025-53715), TL-WR842ND (CVE-2025-53711) and TL-WR949N (CVE-2025-53711)
Important Information:
These devices have reached end-of-life (EOL); therefore, please review the ‘Recommendation(s)’ section carefully.
Vulnerability Description:
This vulnerability in TL-WR841N v11, TL-WR842ND v2 and TL-WR949N v3 may lead to buffer overflow to cause a crash of the web service and result in a denial-of-service (DoS) condition. The attack may be launched remotely. This vulnerability only affects products that are no longer supported by the maintainer.
Impact:
The HTTP service crashes and can be restored after the reboot on TL-WR841N v11, TL-WR842ND v2 and TLWR949N v3.
CVE-2025-53711, CVE-2025-53712, CVE-2025-53713, CVE-2025-53714, and CVE-2025-53715 all have the same CVSS v4.0 score below.
CVSS v4.0 Score: 6.9 / Medium
CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products/Versions and Fixes:
|
Affected Product Model |
Related Vulnerabilities |
Affected Version |
|
TL-WR841N v11 |
CVE-2025-53711 CVE-2025-53712 CVE-2025-53713 CVE-2025-53714 CVE-2025-53715 |
<= 160325 |
|
TL-WR842ND v2 |
CVE-2025-53711 |
<= V2_150514 |
|
TL-WR949N v3 |
CVE-2025-53711 |
<= 3.18.1 Build 1711151 |
Recommendation(s):
We strongly recommended that users with the affected device(s) take the following action(s):
- Upgrade the device to one of our supported models to be able to receive automatic updates for ongoing protection.
Disclaimer:
If you do not take the recommended action(s) stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended action(s) in this statement.
Is this faq useful?
Your feedback helps improve this site.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.