logo
Home/CVEs/CVE-2023-50224/

CVE-2023-50224 - TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability

Project:TP-Link

Product:TL-WR841N

Date Added:2025-09-03Due Date:2025-09-24

Vulnerability Name

TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability

Description

TP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Known To Be Used in Ransomware Campaigns?

Unknown

Action

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Additional Notes

https://www.tp-link.com/us/support/faq/4308/

https://nvd.nist.gov/vuln/detail/CVE-2023-50224

Related News Articles

New TP-Link zero-day surfaces as CISA warns other flaws are exploitedSeptember 5, 2025

CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively ExploitedSeptember 4, 2025