This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108.
Both products have reached the status of EOL (end-of-life).
It's recommending to
purchase the new
product to ensure better performance and security. If replacement is not
an option in the short term, please use the second reference link to
download and install the patch(es).
Metrics
Affected Vendors & Products
Wed, 03 Sep 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Fri, 29 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 29 Aug 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9. This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108. Both products have reached the status of EOL (end-of-life). It's recommending to purchase the new product to ensure better performance and security. If replacement is not an option in the short term, please use the second reference link to download and install the patch(es). | |
Title | Authenticated RCE via Parental Control command injection | |
Weaknesses | CWE-78 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2025-09-03T22:20:24.092Z
Reserved: 2025-08-23T00:15:09.238Z
Link: CVE-2025-9377

Updated: 2025-08-29T18:16:09.221Z

Status : Awaiting Analysis
Published: 2025-08-29T18:15:43.220
Modified: 2025-09-04T01:00:02.693
Link: CVE-2025-9377

No data.

No data.