Metrics
Affected Vendors & Products
Wed, 22 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
ssvc
|
Tue, 21 Oct 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 03 Sep 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Thu, 07 Aug 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link tl-wr841n
|
|
| CPEs | cpe:2.3:h:tp-link:tl-wr841n:12:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr841n_firmware:3.16.9:build_200409:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link tl-wr841n
|
Thu, 19 Sep 2024 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link tl-wr841n Firmware |
|
| CPEs | cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Tp-link
Tp-link tl-wr841n Firmware |
|
| Metrics |
ssvc
|
Wed, 18 Sep 2024 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-19899. | TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899. |
Status: PUBLISHED
Assigner: zdi
Published: 2024-05-03T02:14:42.922Z
Updated: 2025-10-21T23:05:19.610Z
Reserved: 2023-12-05T16:15:17.543Z
Link: CVE-2023-50224
Updated: 2024-08-02T22:09:49.801Z
Status : Modified
Published: 2024-05-03T03:16:10.833
Modified: 2025-10-21T23:16:15.690
Link: CVE-2023-50224
No data.