Home

Description

TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899.

PUBLISHED Reserved 2023-12-05 | Published 2024-05-03 | Updated 2025-10-21 | Assigner zdi




MEDIUM: 6.5CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CISA Known Exploited Vulnerability

Date added 2025-09-03 | Due date 2025-09-24

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Problem types

CWE-290: Authentication Bypass by Spoofing

Product status

Default status
unknown

3.16.9 build 200409
affected

References

www.cisa.gov/...erabilities-catalog?field_cve=CVE-2023-50224 government-resource

www.zerodayinitiative.com/advisories/ZDI-23-1808/ (ZDI-23-1808)

www.tp-link.com/en/support/download/tl-wr841n/v12/ (vendor-provided URL) vendor-advisory

www.zerodayinitiative.com/advisories/ZDI-23-1808/ (ZDI-23-1808)

www.tp-link.com/en/support/download/tl-wr841n/v12/ (vendor-provided URL) vendor-advisory

cve.org (CVE-2023-50224)

nvd.nist.gov (CVE-2023-50224)

Download JSON