Description
TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899.
CISA Known Exploited Vulnerability
Date added 2025-09-03 | Due date 2025-09-24
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Problem types
CWE-290: Authentication Bypass by Spoofing
Product status
3.16.9 build 200409
References
www.cisa.gov/...erabilities-catalog?field_cve=CVE-2023-50224
www.zerodayinitiative.com/advisories/ZDI-23-1808/ (ZDI-23-1808)
www.tp-link.com/en/support/download/tl-wr841n/v12/ (vendor-provided URL)
www.zerodayinitiative.com/advisories/ZDI-23-1808/ (ZDI-23-1808)
www.tp-link.com/en/support/download/tl-wr841n/v12/ (vendor-provided URL)