Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14739: CWE-824 Access of Uninitialized Pointer in TP-Link Systems Inc. WR940N and WR941ND

0
Medium
VulnerabilityCVE-2025-14739cvecve-2025-14739cwe-824
Published: Thu Dec 18 2025 (12/18/2025, 18:02:04 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: WR940N and WR941ND

Description

Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allows local unauthenticated attackers the ability to execute DoS attack and potentially arbitrary code execution under the context of the ‘root’ user.This issue affects WR940N and WR941ND: ≤ WR940N v5 3.20.1 Build 200316, ≤ WR941ND v6 3.16.9 Build 151203.

AI-Powered Analysis

AILast updated: 12/25/2025, 18:46:14 UTC

Technical Analysis

CVE-2025-14739 is a vulnerability classified under CWE-824 (Access of Uninitialized Pointer) affecting TP-Link WR940N and WR941ND routers. The flaw exists due to the router firmware accessing pointers that have not been properly initialized, which can lead to undefined behavior including memory corruption. This vulnerability allows a local attacker without authentication to trigger a denial of service (DoS) condition by crashing the device or, potentially, to execute arbitrary code with root privileges. The affected firmware versions are WR940N v5 3.20.1 Build 200316 and WR941ND v6 3.16.9 Build 151203 or earlier. The vulnerability requires local access to the device, meaning an attacker must be on the same network or have physical access. The CVSS 4.0 vector indicates attack complexity is high (AC:H), no privileges or user interaction are required (PR:N, UI:N), and the impact on confidentiality, integrity, and availability is high (C:H, I:H, A:H). No patches or exploits are currently publicly available, but the risk remains significant due to the potential for root-level code execution. This vulnerability could be exploited to disrupt network connectivity or compromise the router to pivot into internal networks.

Potential Impact

For European organizations, especially small and medium enterprises or home office users relying on TP-Link WR940N and WR941ND routers, this vulnerability poses a risk of network disruption through denial of service or full device compromise. Successful exploitation could lead to loss of network availability, interception or manipulation of network traffic, and unauthorized access to internal systems. Given the root-level code execution potential, attackers could install persistent malware or use the device as a foothold for lateral movement. The requirement for local access limits remote exploitation risk but does not eliminate it, as attackers may gain access via compromised internal hosts or physical proximity. Disruption of network infrastructure in critical sectors such as finance, healthcare, or government could have cascading effects on operations and data confidentiality.

Mitigation Recommendations

Organizations should immediately inventory their network devices to identify the presence of TP-Link WR940N and WR941ND routers running affected firmware versions. Until patches are released, restrict local network access to trusted users and devices by implementing network segmentation and strong access controls. Disable unnecessary services and interfaces on the routers to reduce attack surface. Monitor network traffic for unusual activity that could indicate exploitation attempts. When vendor patches become available, apply firmware updates promptly. Consider replacing legacy devices with models that receive regular security updates. Additionally, enforce physical security controls to prevent unauthorized local access to network equipment. Employ network intrusion detection systems capable of identifying anomalous behavior related to router compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-12-15T18:35:29.224Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694447544eb3efac369fb3f9

Added to database: 12/18/2025, 6:26:28 PM

Last enriched: 12/25/2025, 6:46:14 PM

Last updated: 2/5/2026, 9:59:44 PM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats