First published: Tue Dec 10 2024(Updated: )
TP-Link TL-WR845N(UN)_V4_201214, TL-WR845N(UN)_V4_200909 and TL-WR845N(UN)_V4_190219 were discovered to contain weak default credentials for the Administrator account.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WR845N(UN) | >=TL-WR845N(UN)_V4_190219<=TL-WR845N(UN)_V4_201214 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-50699 is classified as a high severity vulnerability due to the use of weak default credentials for the Administrator account.
To fix CVE-2024-50699, change the default Administrator password to a strong, unique password immediately.
CVE-2024-50699 affects the TP-Link TL-WR845N models with firmware versions TL-WR845N(UN)_V4_201214, TL-WR845N(UN)_V4_200909, and TL-WR845N(UN)_V4_190219.
The risks associated with CVE-2024-50699 include unauthorized access to network settings and increased potential for malicious attacks.
Currently, there is no specific patch available for CVE-2024-50699, so users must manually change the default credentials to mitigate the vulnerability.