Unrated severityCISA KEVNVD Advisory· Published Aug 29, 2025· Updated Feb 26, 2026
Authenticated RCE via Parental Control command injection
CVE-2025-9377
Description
The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9.
This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108.
Both products have reached the status of EOL (end-of-life). It's recommending to
purchase the new product to ensure better performance and security. If replacement is not an option in the short term, please use the second reference link to download and install the patch(es).
Affected products
2- TP-Link Systems Inc./Archer C7(EU) V2v5Range: 0
- TP-Link Systems Inc./TL-WR841N/ND(MS) V9v5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.tp-link.com/us/support/faq/4308/mitrepatchvendor-advisory
- www.tp-link.com/us/support/faq/4365/mitrevendor-advisory
News mentions
0No linked articles in our index yet.