>
Tp-Link

CVE-2023-50224

actively exploited

TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. . Was ZDI-CAN-19899.

6.5
cvss medium
common vulnerability scoring system v3.1. measures intrinsic severity on a 0-10 scale.
epss 0.0169
exploitation prediction scoring system. probability this vulnerability will be exploited in the wild in the next 30 days.
kev yes
cisa known exploited vulnerabilities catalog. confirmed active exploitation.
CVSS 3.0 Common Vulnerability Scoring System v3.0
6.5 / 10
MEDIUM
exploitability
Attack Vector
Adjacent
Attack Vector (AV:A): requires access to the local network segment (e.g. same WiFi, VLAN). not exploitable from the internet.
Attack Complexity
Low
Attack Complexity (AC:L): no special conditions needed. attack can be reliably reproduced.
Privileges Required
None
Privileges Required (PR:N): no authentication needed. any anonymous attacker can exploit this.
User Interaction
None
User Interaction (UI:N): no victim action needed. fully exploitable without user interaction.
impact
Scope
Unchanged
Scope (S:U): impact limited to the vulnerable component.
Confidentiality
High
Confidentiality (C:H): total information disclosure. attacker gains access to all data within the component.
Integrity
None
Integrity (I:N): no integrity impact.
Availability
None
Availability (A:N): no availability impact.
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
exploit detect attrib advisory media timeline
activity density
rdintel assessment
actively exploited. patch immediately.
28 threat composite score from 15+ signals including exploitation status, epss probability, detection coverage, and community attention. 0-100 scale.

sign in to view full intelligence

pocs, detection rules, timeline, advisories, and more