Multiple vulnerabilities have been identified in popular TP-Link routers that expose users to severe security risks due to SQL injection flaws in their web management interfaces.
These vulnerabilities, discovered by security researcher “The Veteran,” allow remote attackers to bypass authentication and gain unauthorized control of the devices without needing valid credentials.
This vulnerability affects the TP-Link EAP120 router (version 1.0). The login dashboard fails to properly sanitize user input in the authentication fields.
As a result, an unauthenticated attacker can inject malicious SQL statements through these fields.
Successful exploitation could allow the attacker to bypass authentication and potentially gain administrative access to the device.
The TP-Link TL-WR840N router (version 1.0) is susceptible to a similar SQL injection flaw.
The login dashboard accepts unsanitized input in the username and password fields, enabling an unauthenticated attacker to inject arbitrary SQL code.
This can bypass login controls and access the router’s administrative interface without valid credentials.
This vulnerability affects the TP-Link M7200 4G LTE Mobile Wi-Fi Router running firmware version 1.0.7 Build 180127 Rel.55998n.
The device’s login interface does not properly sanitize input in the username and password fields, allowing an unauthenticated attacker to inject malicious SQL statements.
Exploitation could result in unauthorized access to the router’s management console.
The TP-Link M7450 4G LTE Mobile Wi-Fi Router, specifically firmware version 1.0.2 Build 170306 Rel.1015n, is vulnerable to SQL injection via the username and password fields on its login page.
An unauthenticated attacker can exploit this flaw to inject arbitrary SQL commands, potentially leading to full compromise of the device’s administrative functions.
CVEs | Affected Products | Impact | Exploit Prerequisites | CVSS 3.1 Score |
CVE-2025-29648 | TP-Link EAP120 router (Version 1.0) | Authentication bypassUnauthorized admin accessSQL database manipulation | Network access to web interfaceDefault/login page exposure | 9.8 (Critical) |
CVE-2025-29649 | TP-Link TL-WR840N router (Version 1.0) | Full device compromiseDNS hijackingTraffic interception | Unpatched firmwareWeb management interface enabled | 9.8 (Critical) |
CVE-2025-29650 | TP-Link M7200 4G LTE Mobile Wi-Fi Router (Firmware 1.0.7 Build 180127 Rel.55998n) | Credential theftNetwork reconPersistent backdoor installation | Remote access to login portalLack of input validation | 9.8 (Critical) |
CVE-2025-29653 | TP-Link M7450 4G LTE Mobile Wi-Fi Router (Firmware 1.0.2 Build 170306 Rel.1015n) | Complete control over 4G connectionIMSI/cellular data exposure | Cellular interface exposureDefault admin credentials unchanged | 9.8 (Critical) |
These vulnerabilities pose significant security risks to both home and business users. A successful attack could grant adversaries complete control over the affected routers, potentially allowing them to:
TP-Link has been notified of these vulnerabilities, but as of this publication, no security patches have been confirmed as being released.
Until official fixes become available, security experts recommend the following precautions:
Users of the affected devices should monitor TP-Link’s security advisories for upcoming patches and implement recommended security measures immediately.
Malware Trends Report Based on 15000 SOC Teams Incidents, Q1 2025 out!-> Get Your Free Copy