TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
. Was ZDI-CAN-19899.
Advisories
Source ID Title
EUVD EUVD EUVD-2023-55046 TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 09:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 08:30:00 +0900


Wed, 22 Oct 2025 05:30:00 +0900


Wed, 22 Oct 2025 04:30:00 +0900


Thu, 04 Sep 2025 02:15:00 +0900

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-09-03T00:00:00+00:00', 'dueDate': '2025-09-24T00:00:00+00:00'}


Fri, 08 Aug 2025 01:00:00 +0900

Type Values Removed Values Added
First Time appeared Tp-link tl-wr841n
CPEs cpe:2.3:h:tp-link:tl-wr841n:12:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr841n_firmware:3.16.9:build_200409:*:*:*:*:*:*
Vendors & Products Tp-link tl-wr841n

Thu, 19 Sep 2024 17:30:00 +0900

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link tl-wr841n Firmware
CPEs cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:*
Vendors & Products Tp-link
Tp-link tl-wr841n Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Sep 2024 03:45:00 +0900

Type Values Removed Values Added
Description TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-19899. TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published:

Updated: 2025-10-21T23:05:19.610Z

Reserved: 2023-12-05T16:15:17.543Z

Link: CVE-2023-50224

cve-icon Vulnrichment

Updated: 2024-08-02T22:09:49.801Z

cve-icon NVD

Status : Analyzed

Published: 2024-05-03T03:16:10.833

Modified: 2025-10-27T17:05:21.053

Link: CVE-2023-50224

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses