CVE-2023-50224 - TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability
Project:TP-Link
Product:TL-WR841N
Date Added:2025-09-03Due Date:2025-09-24
Vulnerability Name
TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability
Description
TP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
Known To Be Used in Ransomware Campaigns?
Unknown
Action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Additional Notes
https://www.tp-link.com/us/support/faq/4308/
https://nvd.nist.gov/vuln/detail/CVE-2023-50224
Related News Articles
New TP-Link zero-day surfaces as CISA warns other flaws are exploitedSeptember 5, 2025
CISA Flags TP-Link Router Flaws CVE-2023-50224 and CVE-2025-9377 as Actively ExploitedSeptember 4, 2025