CVE-2023-50224

TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wr841n_firmware:3.16.9:build_200409:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr841n:12:*:*:*:*:*:*:*

History

07 Aug 2025, 15:57

Type Values Removed Values Added
CPE cpe:2.3:o:tp-link:tl-wr841n_firmware:3.16.9:build_200409:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr841n:12:*:*:*:*:*:*:*
References () https://www.tp-link.com/en/support/download/tl-wr841n/v12/#Firmware - () https://www.tp-link.com/en/support/download/tl-wr841n/v12/#Firmware - Product
References () https://www.zerodayinitiative.com/advisories/ZDI-23-1808/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-1808/ - Third Party Advisory
First Time Tp-link tl-wr841n
Tp-link tl-wr841n Firmware
Tp-link

18 Sep 2024, 19:15

Type Values Removed Values Added
Summary TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-19899. TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899.

03 May 2024, 03:16

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-03 03:16

Updated : 2025-08-07 15:57


NVD link : CVE-2023-50224

Mitre link : CVE-2023-50224


JSON object : View

Products Affected

tp-link

  • tl-wr841n
  • tl-wr841n_firmware
CWE

No CWE.