No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 13 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link tl-mr6400 |
|
| Vendors & Products |
Tp-link
Tp-link tl-mr6400 |
Thu, 12 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability has been identified in the Telnet command-line interface (CLI) of TP-Link TL-MR6400 v5.3. This issue is caused by insufficient sanitization of data processed during specific CLI operations. An authenticated attacker with elevated privileges may be able to execute arbitrary system commands. Successful exploitation may lead to full device compromise, including potential loss of confidentiality, integrity, and availability. | |
| Title | Command Injection Vulnerability in Telnet CLI on TP-Link TL-MR6400 | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-03-13T14:35:24.733Z
Reserved: 2026-03-09T17:28:57.540Z
Link: CVE-2026-3841
Updated: 2026-03-13T14:35:21.577Z
Status : Awaiting Analysis
Published: 2026-03-12T18:16:26.107
Modified: 2026-03-12T21:07:53.427
Link: CVE-2026-3841
No data.
OpenCVE Enrichment
Updated: 2026-03-13T09:50:49Z