The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both products have reached the status of EOL (end-of-life). It's recommending to purchase the new product to ensure better performance and security. If replacement is not an option in the short term, please use the second reference link to download and install the patch(es).
History

Thu, 04 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link archer C7
Tp-link archer C7 Firmware
Tp-link tl-wr841n
Tp-link tl-wr841n Firmware
Tp-link tl-wr841nd
Tp-link tl-wr841nd Firmware
CPEs cpe:2.3:h:tp-link:archer_c7:2.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr841n:v9:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr841nd:9:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_c7_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr841n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr841nd_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link
Tp-link archer C7
Tp-link archer C7 Firmware
Tp-link tl-wr841n
Tp-link tl-wr841n Firmware
Tp-link tl-wr841nd
Tp-link tl-wr841nd Firmware
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Wed, 03 Sep 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-09-03T00:00:00+00:00', 'dueDate': '2025-09-24T00:00:00+00:00'}


Fri, 29 Aug 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 29 Aug 2025 17:45:00 +0000

Type Values Removed Values Added
Description The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both products have reached the status of EOL (end-of-life). It's recommending to purchase the new product to ensure better performance and security. If replacement is not an option in the short term, please use the second reference link to download and install the patch(es).
Title Authenticated RCE via Parental Control command injection
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published: 2025-08-29T17:30:33.700Z

Updated: 2025-09-03T22:20:24.092Z

Reserved: 2025-08-23T00:15:09.238Z

Link: CVE-2025-9377

cve-icon Vulnrichment

Updated: 2025-08-29T18:16:09.221Z

cve-icon NVD

Status : Analyzed

Published: 2025-08-29T18:15:43.220

Modified: 2025-09-04T13:41:48.497

Link: CVE-2025-9377

cve-icon Redhat

No data.