A command injection vulnerability was identified in TP-Link TL-WR802N v4, TL-WR841N v14, and TL-WR840N v6 due to improper neutralization of special elements used in an OS command. In the router configuration import function allows an authenticated attacker to upload a crafted configuration file that results in execution of OS commands with root privileges during port-trigger processing.
Successful exploitation allows an authenticated attacker to execute system commands with root privileges, leading to full device compromise.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 16 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link tl-wr802n
Tp-link tl-wr841n
Tp Link
Tp Link tl-wr840n
Vendors & Products Tp-link
Tp-link tl-wr802n
Tp-link tl-wr841n
Tp Link
Tp Link tl-wr840n

Fri, 13 Mar 2026 22:00:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability was identified in TP-Link TL-WR802N v4, TL-WR841N v14, and TL-WR840N v6 due to improper neutralization of special elements used in an OS command. In the router configuration import function allows an authenticated attacker to upload a crafted configuration file that results in execution of OS commands with root privileges during port-trigger processing. Successful exploitation allows an authenticated attacker to execute system commands with root privileges, leading to full device compromise.
Title Authenticated Command Injection on TP-Link TL-WR802N, TL-WR841N and TL-WR840N
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-03-17T03:55:35.442Z

Reserved: 2026-02-25T20:03:19.802Z

Link: CVE-2026-3227

cve-icon Vulnrichment

Updated: 2026-03-16T15:31:32.795Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-16T14:19:47.257

Modified: 2026-03-16T14:53:07.390

Link: CVE-2026-3227

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-16T09:22:31Z

Weaknesses