From 79196a572796bb65f77fe39cfbec3ad854a821a0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 19 Apr 2025 01:00:31 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2025/25xxx/CVE-2025-25427.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/2025/25xxx/CVE-2025-25427.json b/2025/25xxx/CVE-2025-25427.json index f6855a056ca..5450d8d527b 100644 --- a/2025/25xxx/CVE-2025-25427.json +++ b/2025/25xxx/CVE-2025-25427.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A Stored cross-site scripting (XSS) vulnerability in upnp page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 231119 Rel.67074n allows adjacent attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded." + "value": "A stored cross-site scripting (XSS) vulnerability in the upnp.htm page of the web Interface in TP-Link WR841N v14/v14.6/v14.8 <= Build 241230 Rel. 50788n allows remote attackers to inject arbitrary JavaScript code via the port mapping description. This leads to an execution of the JavaScript payload when the upnp page is loaded." } ] }, @@ -42,7 +42,7 @@ { "version_affected": "<=", "version_name": "0", - "version_value": "Build 231119 Rel.67074n" + "version_value": "Build 241230 Rel. 50788n" } ] }