Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14739: CWE-824 Access of Uninitialized Pointer in TP-Link Systems Inc. WR940N and WR941ND

0
Medium
VulnerabilityCVE-2025-14739cvecve-2025-14739cwe-824
Published: Thu Dec 18 2025 (12/18/2025, 18:02:04 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: WR940N and WR941ND

Description

Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allows local unauthenticated attackers the ability to execute DoS attack and potentially arbitrary code execution under the context of the ‘root’ user.This issue affects WR940N and WR941ND: ≤ WR940N v5 3.20.1 Build 200316, ≤ WR941ND v6 3.16.9 Build 151203.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:32:10 UTC

Technical Analysis

CVE-2025-14739 is a vulnerability categorized under CWE-824 (Access of Uninitialized Pointer) found in TP-Link Systems Inc. WR940N and WR941ND routers. This flaw arises from the device firmware improperly handling pointers that have not been initialized before use, which can lead to unpredictable behavior including memory corruption. An attacker with local access but no authentication can exploit this vulnerability to trigger a denial-of-service condition or potentially execute arbitrary code with root privileges, thereby gaining full control over the device. The affected firmware versions include WR940N v5 3.20.1 Build 200316 and WR941ND v6 3.16.9 Build 151203 or earlier. The CVSS 4.0 base score is 6.8, reflecting medium severity, with attack vector being adjacent network (local), high attack complexity, and no privileges or user interaction required. The vulnerability impacts confidentiality, integrity, and availability, as root-level code execution could allow attackers to manipulate device configurations, intercept or redirect traffic, or disrupt network services. Currently, there are no known public exploits or patches available, and the vulnerability was published on December 18, 2025. The absence of patches necessitates proactive mitigation to prevent exploitation.

Potential Impact

The vulnerability poses significant risks to organizations relying on TP-Link WR940N and WR941ND routers, especially in environments where local network access is not tightly controlled. Successful exploitation could lead to denial-of-service, disrupting network connectivity and business operations. More critically, arbitrary code execution at root level could allow attackers to compromise the router’s firmware, intercept or manipulate network traffic, create persistent backdoors, or pivot to internal networks, severely impacting confidentiality, integrity, and availability of organizational data and services. This is particularly concerning for small to medium enterprises and home office setups where these models are common and network segmentation or monitoring may be limited. The medium CVSS score reflects the requirement for local access and high attack complexity, which somewhat limits remote exploitation but does not eliminate risk in shared or poorly secured local networks.

Mitigation Recommendations

Organizations should immediately restrict physical and local network access to affected TP-Link WR940N and WR941ND devices to trusted personnel only. Network segmentation should be enforced to isolate these routers from sensitive internal systems. Monitor network traffic for unusual activity indicative of exploitation attempts. Disable any unnecessary services or features on the routers to reduce attack surface. Since no official patches are currently available, consider replacing affected devices with updated models or firmware versions once released. Employ strong administrative passwords and change default credentials to prevent unauthorized local access. Regularly check TP-Link’s official channels for firmware updates or security advisories addressing this vulnerability. Additionally, implement network intrusion detection systems (NIDS) capable of detecting anomalous behavior related to router compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-12-15T18:35:29.224Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694447544eb3efac369fb3f9

Added to database: 12/18/2025, 6:26:28 PM

Last enriched: 2/27/2026, 6:32:10 AM

Last updated: 3/25/2026, 10:05:25 AM

Views: 132

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses