Cross-Site Request Forgery Vulnerability in TP-Link TL-WR720N Router
CVE-2018-25321

5.3MEDIUM

Key Information:

Vendor

Tp-link

Vendor
CVE Published:
17 May 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2018-25321?

The TP-Link TL-WR720N wireless router is susceptible to a Cross-Site Request Forgery (CSRF) vulnerability that enables attackers to execute unauthorized administrative actions. By tricking authenticated users into visiting malicious web pages, attackers can alter critical settings, such as modifying port forwarding rules through VirtualServerRpm.htm or changing WiFi security settings via WlanSecurityRpm.htm. This flaw emphasizes the need for securing router interfaces against CSRF attacks and protecting user sessions from being exploited.

Affected Version(s)

TL-WR720NMbps Wireless N Router V1_130719

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Mans van Someren
.