CVE-2018-25321 PUBLISHED

TP-Link TL-WR720N All Versions CSRF via Administrative Interfaces

Assigner: VulnCheck
Reserved: 17.05.2026 Published: 17.05.2026 Updated: 17.05.2026

TP-Link TL-WR720N wireless router contains a cross-site request forgery vulnerability that allows attackers to perform unauthorized administrative actions by crafting malicious web requests. Attackers can modify port forwarding rules via VirtualServerRpm.htm or change WiFi security settings via WlanSecurityRpm.htm by tricking authenticated users into visiting attacker-controlled pages.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:L/SA:L
CVSS Score: 5.3

Product Status

Vendor Tp-link
Product TL-WR720NMbps Wireless N Router
Versions
  • Version V1_130719 is affected

Credits

  • Mans van Someren finder

References

Problem Types

  • Cross-Site Request Forgery (CSRF) CWE