First published: Wed Feb 22 2023(Updated: )
TP-Link router TL-WR940N V6 3.19.1 Build 180119 uses a deprecated MD5 algorithm to hash the admin password used for basic authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-wr940n Firmware | =6_3.19.1-180119 | |
TP-Link TL-WR940N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-23040 is high with a CVSS score of 7.5.
CVE-2023-23040 affects TP-Link router TL-WR940N V6 3.19.1 Build 180119 by using a deprecated MD5 algorithm to hash the admin password used for basic authentication.
Yes, TP-Link TL-WR940N V6 3.19.1 Build 180119 is vulnerable to CVE-2023-23040.
To fix CVE-2023-23040, TP-Link TL-WR940N users should update their firmware to a version that no longer uses the deprecated MD5 algorithm for password hashing.
You can find more information about CVE-2023-23040 on the following references: [Reference 1](https://midist0xf.medium.com/tl-wr940n-uses-weak-md5-hashing-algorithm-ae7b589860d2), [Reference 2](https://www.tp-link.com/en/support/download/tl-wr940n/#Firmware)