vulnerability

TP-LINK TL-WR841N: CVE-2023-50224: Authentication Bypass by Spoofing

Severity
6
CVSS
(AV:A/AC:L/Au:N/C:C/I:N/A:N)
Published
May 3, 2024
Added
Sep 19, 2025
Modified
Sep 19, 2025

Description

TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
. Was ZDI-CAN-19899.

Solution

tp-link-tl-wr841n-upgrade-latest
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.