TROYANOSYVIRUS
Volver a CVEs

CVE-2025-9377

HIGHCISA KEV
7.2

Descripcion

The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both products have reached the status of EOL (end-of-life). It's recommending to purchase the new product to ensure better performance and security. If replacement is not an option in the short term, please use the second reference link to download and install the patch(es).

Detalles CVE

Puntuacion CVSS v3.17.2
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosHIGH
Interaccion usuarioNONE
Publicado8/29/2025
Ultima modificacion11/3/2025
Fuentekev
Avistamientos honeypot0

CISA KEV

VendedorTP-Link
ProductoMultiple Routers
Nombre vulnerabilidadTP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability
Fecha inclusion KEV2025-09-03
Fecha limite remediacion2025-09-24
Uso en ransomwareUnknown

Productos afectados

tp-link:archer_c7tp-link:archer_c7_firmwaretp-link:tl-wr841ntp-link:tl-wr841n_firmwaretp-link:tl-wr841ndtp-link:tl-wr841nd_firmware

Debilidades (CWE)

CWE-78

Referencias

Correlaciones IOC

Sin correlaciones registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.