CVE-2025-15606
Denial-of-Service in TP-Link TD-W8961N httpd via Input Sanitization Flaw
Publication date: 2026-03-23
Last updated on: 2026-03-31
Assigner: TPLink
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tp-link | td-w8961nd_firmware | to 250925 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Denial-of-Service (DoS) issue in the httpd component of the TP-Link TD-W8961N router, specifically version 4.0 and earlier firmware versions prior to V4_250925.
It occurs due to improper input sanitization in the HTTP daemon (httpd), which allows an attacker to send specially crafted HTTP requests that trigger a processing error.
This processing error causes the httpd service to crash, resulting in a denial-of-service condition that interrupts the deviceβs network service availability.
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': 'Successful exploitation of this vulnerability can cause the httpd service on the affected TP-Link TD-W8961N router to crash.'}, {'type': 'paragraph', 'content': "This crash leads to a denial-of-service condition, meaning the device's network services become unavailable or interrupted."}, {'type': 'paragraph', 'content': 'If the device is not updated with the fixed firmware version (V4_250925 or later), the vulnerability remains exploitable, potentially causing repeated service interruptions.'}] [2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2025-15606 vulnerability in the TP-Link TD-W8961N router, you should immediately update the device firmware to version V4_250925 or later, which contains a fix for the input sanitization flaw in the httpd component.
Since the TD-W8961N model has reached end-of-life, it is also strongly recommended to upgrade to a supported TP-Link model to receive ongoing automatic security updates.
Failure to apply the firmware update or upgrade the device leaves the vulnerability exploitable, potentially causing service interruptions due to denial-of-service conditions.