Click to skip the navigation bar

Statement on Deny of Service (DoS) vulnerability on TL-WR940N V6 (CVE-2025-11676)

Security Advisory
Updated 11-20-2025 08:04:41 AM Number of views for this article143

Statement on Deny of Service (DoS) vulnerability on TL-WR940N V6 (CVE-2025-11676)

Vulnerability Description:

Improper input validation vulnerability in TP-Link System Inc. TL-WR940N V6 (UPnP modules), which allows unauthenticated adjacent attackers to perform DoS attack. This issue affects TL-WR940N V6 <= Build 220801.

Impact:

This vulnerability may cause the UPnP service on the device to become unavailable.

CVSS v4.0 Score: 7.1 / High

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Product Model

Related Vulnerabilities

Affected Version

Fixed Version

TL-WR940N V6

CVE-2025-11676

<= Build 220801

Build 250919

Build 250925

Recommendation(s):

We strongly recommended that users with the affected device(s) take the following action(s):

  1. Download and update to the latest firmware to fix the vulnerabilities.

The latest firmware of related models and download links are below:

https://www.tp-link.com/us/support/download/tl-wr940n/v6/#Firmware

https://www.tp-link.com/en/support/download/tl-wr940n/v6/#Firmware

Disclaimer:

If you do not take the recommended action(s) stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended action(s) in this statement.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >