Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link tl-mr6400 Firmware
|
|
| CPEs | cpe:2.3:h:tp-link:tl-mr6400:5.3:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-mr6400_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link tl-mr6400 Firmware
|
|
| Metrics |
cvssV3_1
|
Fri, 13 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link tl-mr6400 |
|
| Vendors & Products |
Tp-link
Tp-link tl-mr6400 |
Thu, 12 Mar 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability has been identified in the Telnet command-line interface (CLI) of TP-Link TL-MR6400 v5.3. This issue is caused by insufficient sanitization of data processed during specific CLI operations. An authenticated attacker with elevated privileges may be able to execute arbitrary system commands. Successful exploitation may lead to full device compromise, including potential loss of confidentiality, integrity, and availability. | |
| Title | Command Injection Vulnerability in Telnet CLI on TP-Link TL-MR6400 | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-03-13T14:35:24.733Z
Reserved: 2026-03-09T17:28:57.540Z
Link: CVE-2026-3841
Updated: 2026-03-13T14:35:21.577Z
Status : Analyzed
Published: 2026-03-12T18:16:26.107
Modified: 2026-04-02T13:03:46.797
Link: CVE-2026-3841
No data.
OpenCVE Enrichment
Updated: 2026-03-20T15:48:48Z