First published: Tue Dec 10 2024(Updated: )
TL-WR845N(UN)_V4_201214, TP-Link TL-WR845N(UN)_V4_200909, and TL-WR845N(UN)_V4_190219 was discovered to transmit user credentials in plaintext after executing a factory reset.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link WR845N Firmware | =V4_201214=V4_200909=V4_190219 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-46340 is considered to have a high severity due to the transmission of user credentials in plaintext.
To mitigate CVE-2024-46340, update your TP-Link TL-WR845N firmware to the latest version provided by TP-Link.
CVE-2024-46340 affects TP-Link TL-WR845N models with firmware versions V4_201214, V4_200909, and V4_190219.
CVE-2024-46340 compromises user credentials as they are transmitted in plaintext after a factory reset.
Yes, CVE-2024-46340 can potentially be exploited remotely if a user accesses the router after a factory reset.