First published: Wed Feb 09 2022(Updated: )
The vulnerability exists in TP-Link TL-WR841N V11 3.16.9 Build 160325 Rel.62500n wireless router due to transmission of authentication information in cleartextbase64 format. Successful exploitation of this vulnerability could allow a remote attacker to intercept credentials and subsequently perform administrative operations on the affected device through web-based management interface.
Credit: vdisclose@cert-in.org.in
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr841n Firmware | =3.16.9-build160325_rel.62500n | |
TP-LINK TL-WR841N | =11 |
Update TPLinkWR841N firmware https://static.tp-link.com/upload/beta/2021/202112/20211209/wr841nv11_wr841ndv11_eu_3_16_9_up_boot(211209).zip
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0162 is a vulnerability that exists in TP-Link TL-WR841N V11 3.16.9 Build 160325 Rel.62500n wireless router due to the transmission of authentication information in cleartextbase64 format.
CVE-2022-0162 has a severity rating of 9.8, which is considered critical.
TP-Link TL-WR841N V11 3.16.9 Build 160325 Rel.62500n firmware is affected by CVE-2022-0162.
CVE-2022-0162 can be exploited by a remote attacker intercepting credentials transmitted in cleartextbase64 format.
Yes, TP-Link TL-WR841N V11 3.16.9 Build 160325 Rel.62500n firmware is vulnerable to CVE-2022-0162.