A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.tp-link.com/us/support/faq/4415/ | vendor advisory |
https://www.tp-link.com/us/support/download/tl-wr841n/#Firmware | product |
https://github.com/slin99/2025-25427 | third party advisory exploit |
https://github.com/slin99/2025-25427/blob/master/readme.md | exploit third party advisory |