Security Advisory on Vulnerabilities in TP-Link WA850RE, WA940N and WR941ND (CVE-2025-14737, CVE-2025-14738, CVE-2025-14739)
Important Information:
These devices have reached end-of-life (EOL); therefore, please review the ‘Recommendation(s)’ section carefully.
Vulnerabilities Description:
In TP-Link WA850RE (httpd modules):
Command Injection vulnerability allows authenticated adjacent attackers to inject arbitrary commands.
Improper authentication vulnerability allows unauthenticated attackers to download the configuration file.
In TP-Link WR940N and WR941ND:
Access of Uninitialized Pointer vulnerability allows local unauthenticated attackers the ability to execute DoS attacks and potentially arbitrary code execution under the context of the ‘root’ user.
Impacts:
In TP-Link WA850RE:
The command Injection vulnerability allows authenticated adjacent attackers to inject arbitrary commands with root privileges. This issue is further exacerbated when combined with the configuration leak from Unauthenticated Configuration Disclosure Vulnerability.
Improper authentication vulnerability allows unauthenticated attackers to download the configuration file. Retrieval of this file results in the exposure of admin credentials and other sensitive information.
WA850RE Command Injection vulnerability
CVSS v4.0 Score: 7.1 / High
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
WA850RE Unauthenticated Configuration Disclosure Vulnerability
CVSS v4.0 Score: 5.7 / Medium
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P
In TP-Link WA940N and WR941ND:
Exploitation of Uninitialized Pointer Vulnerability allows local unauthenticated attackers to crash the device (DoS) and, in severe cases, execute arbitrary code with root privileges, leading to full system compromise..
CVSS v4.0 Score: 6.8 /Medium
CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
Affected Products/Versions and Fixes:
|
Affected Product Model |
Related Vulnerabilities |
Affected Version |
|
WA850RE v2
WA940N v5 WR941ND v6 |
CVE-2025-14737 & CVE-2025-14738 CVE-2025-14739 CVE-2025-14739 |
<= V2_160527 <= V3_160922 <= 3.20.1 Build 200316 <= 3.16.9 Build 151203 |
Recommendation(s):
We strongly recommend that users with the affected device(s) take the following action(s):
- Download and update to the latest firmware version to fix these vulnerabilities:
https://www.tp-link.com/us/support/download/tl-wa850re/v2/#Firmware
https://www.tp-link.com/us/support/download/tl-wa850re/v3/#Firmware
https://www.tp-link.com/us/support/download/tl-wr941nd/#Firmware
https://www.tp-link.com/us/support/download/tl-wr940n/v5/#Firmware
Disclaimer:
If you do not take the recommended actions stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this statement.
Is this faq useful?
Your feedback helps improve this site.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.