CVE-2025-14739
Uninitialized Pointer Vulnerability in TP-Link WR940N and WR941ND
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Access of Uninitialized Pointer vulnerability in TP-Link WR940N and WR941ND allows local unauthenticated attackers the ability to execute DoS attack and potentially arbitrary code execution under the context of the ‘root’ user.This issue affects WR940N and WR941ND: ≤ WR940N v5 3.20.1 Build 200316, ≤ WR941ND v6 3.16.9 Build 151203.
| CWE | CWE-824 |
| Vendor | tp-link systems inc. |
| Product | wr940n and wr941nd |
| Published | Dec 18, 2025 |
| Last Updated | Feb 26, 2026 |
Stay Ahead of the Next One
Get instant alerts for tp-link systems inc. wr940n and wr941nd
Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. wr940n and wr941nd are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
TP-Link Systems Inc. / WR940N and WR941ND
0 ≤ WR940N v5 3.20.1 Build 200316 0 ≤ WR941ND v6 3.16.9 Build 151203
References
tp-link.com: https://www.tp-link.com/us/support/download/tl-wr941nd/#Firmware tp-link.com: https://www.tp-link.com/us/support/download/tl-wr940n/v5/#Firmware blog.exodusintel.com: https://blog.exodusintel.com/2022/06/23/tp-link-wr940n-wr941nd-uninitialized-pointer-vulnerability/ tp-link.com: https://www.tp-link.com/us/support/faq/4848/
Credits
🔍 VulnCheck