Zero Day Monitor
DashboardVulnerabilitiesTrendingZero-DaysNews
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
935 articles · 105089 vulns · 39/41 feeds (7d)
← Back to list
—
CVE-2026-3622
tp-link systems · tl-wr841n

Denial-of-Service Vulnerability in UPnP Component of TP Link's TL-WR841N

Description

The vulnerability exists in the UPnP component of TL-WR841N v14, where improper input validation leads to an out-of-bounds read, potentially causing a crash of the UPnP service. Successful exploitation can cause the UPnP service to crash, resulting in a Denial-of-Service condition.  This vulnerability affects TL-WR841N v14 < EN_0.9.1 4.19 Build 260303 Rel.42399n (V14_260303) and < US_0.9.1.4.19 Build 260312 Rel. 49108n (V14_0304).

Affected Products

VendorProductVersions
tp-link systemstl-wr841n0, 0.9.1

References

  • https://www.tp-link.com/en/support/download/tl-wr841n/v14/#Firmware(patch)
  • https://www.tp-link.com/us/support/download/tl-wr841n/v14/#Firmware(patch)
  • https://www.tp-link.com/us/support/faq/5033/(vendor-advisory)

Related News (1 articles)

Tier C
VulDB2h ago
CVE-2026-3622 | TP-Link TL-WR841N -/0.9.1 UPnP out-of-bounds
→ No new info (linked only)
CISA KEV❌ No
Actively exploited❌ No
CWECWE-125
Published3/26/2026
Last enriched28m agov2
Trending Score20
Source articles1
Independent1
Info Completeness7/14
Missing: cvss, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Version History

v2
Last enriched 28m ago
v2Tier C28m ago

Updated vendor to TP-Link, product to TL-WR841N, added affected version 0.9.1, changed severity to HIGH, and noted that no exploit is available.

affectedVersions
via VulDB
v12h ago

Initial creation