TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899.
History

Wed, 22 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 23:30:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Wed, 03 Sep 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-09-03T00:00:00+00:00', 'dueDate': '2025-09-24T00:00:00+00:00'}


Thu, 07 Aug 2025 16:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link tl-wr841n
CPEs cpe:2.3:h:tp-link:tl-wr841n:12:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr841n_firmware:3.16.9:build_200409:*:*:*:*:*:*
Vendors & Products Tp-link tl-wr841n

Thu, 19 Sep 2024 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link tl-wr841n Firmware
CPEs cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:*
Vendors & Products Tp-link
Tp-link tl-wr841n Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 18 Sep 2024 18:45:00 +0000

Type Values Removed Values Added
Description TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-19899. TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2024-05-03T02:14:42.922Z

Updated: 2025-10-21T23:05:19.610Z

Reserved: 2023-12-05T16:15:17.543Z

Link: CVE-2023-50224

cve-icon Vulnrichment

Updated: 2024-08-02T22:09:49.801Z

cve-icon NVD

Status : Modified

Published: 2024-05-03T03:16:10.833

Modified: 2025-10-21T23:16:15.690

Link: CVE-2023-50224

cve-icon Redhat

No data.