Click to skip the navigation bar

Security Advisory on Null pointer Dereference Vulnerability on TP-Link TL-WR841N (CVE-2025-9014)

Security Advisory
Updated 01-15-2026 17:30:36 PM Number of views for this article68

Vulnerability Description:

A Null Pointer Dereference vulnerability exists in the referrer header check of the web portal of TP-Link TL-WR841N v14, caused by improper input validation.

Impact:

A remote, unauthenticated attacker can exploit this flaw and cause Denial of Service on the web portal service.

CVSS v4.0 Score: 6.3 / Medium

CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Product Model

Related Vulnerabilities

Affected Version

Fixed Version

TL-WR841N v14

CVE-2025-9014

< 250908

>= 250908

Recommendation(s):

We strongly recommend that users with the affected device(s) take the following action(s):

  1. Download and update to the latest firmware to fix the vulnerabilities.

US: https://www.tp-link.com/us/support/download/tl-wr841n/v14/#Firmware

EN: https://www.tp-link.com/en/support/download/tl-wr841n/v14/#Firmware

JP: https://www.tp-link.com/jp/support/download/tl-wr841n/v14/#Firmware

Disclaimer:

If you do not take the recommended action(s) stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended action(s) in this statement.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >