A command injection vulnerability was identified in TP-Link TL-WR802N v4, TL-WR841N v14, and TL-WR840N v6 due to improper neutralization of special elements used in an OS command. In the router configuration import function allows an authenticated attacker to upload a crafted configuration file that results in execution of OS commands with root privileges during port-trigger processing.
Successful exploitation allows an authenticated attacker to execute system commands with root privileges, leading to full device compromise.

Project Subscriptions

Vendors Products
Tp-link Subscribe
Tl-wr802n Subscribe
Tl-wr802n Firmware Subscribe
Tl-wr840n Subscribe
Tl-wr840n Firmware Subscribe
Tl-wr841n Subscribe
Tl-wr841n Firmware Subscribe
Tp Link Subscribe
Tl-wr840n Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link tl-wr802n Firmware
Tp-link tl-wr840n
Tp-link tl-wr840n Firmware
Tp-link tl-wr841n Firmware
CPEs cpe:2.3:h:tp-link:tl-wr802n:v4:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr840n:6:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr841n:14:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr802n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr840n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr841n_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link tl-wr802n Firmware
Tp-link tl-wr840n
Tp-link tl-wr840n Firmware
Tp-link tl-wr841n Firmware
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Mon, 16 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link tl-wr802n
Tp-link tl-wr841n
Tp Link
Tp Link tl-wr840n
Vendors & Products Tp-link
Tp-link tl-wr802n
Tp-link tl-wr841n
Tp Link
Tp Link tl-wr840n

Fri, 13 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability was identified in TP-Link TL-WR802N v4, TL-WR841N v14, and TL-WR840N v6 due to improper neutralization of special elements used in an OS command. In the router configuration import function allows an authenticated attacker to upload a crafted configuration file that results in execution of OS commands with root privileges during port-trigger processing. Successful exploitation allows an authenticated attacker to execute system commands with root privileges, leading to full device compromise.
Title Authenticated Command Injection on TP-Link TL-WR802N, TL-WR841N and TL-WR840N
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-03-17T03:55:35.442Z

Reserved: 2026-02-25T20:03:19.802Z

Link: CVE-2026-3227

cve-icon Vulnrichment

Updated: 2026-03-16T15:31:32.795Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:47.257

Modified: 2026-04-07T01:07:52.933

Link: CVE-2026-3227

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T20:02:36Z

Weaknesses