First published: Wed Feb 26 2025(Updated: )
TL-WR845N(UN)_V4_200909 and TL-WR845N(UN)_V4_190219 was discovered to contain a hardcoded password for the root account which can be obtained by analyzing downloaded firmware or via a brute force attack through physical access to the router.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link WR845N Firmware | >=V4_190219<=V4_200909 | |
All of | ||
Any of | ||
TP-Link TL-WR845N Firmware | =190219 | |
TP-Link TL-WR845N Firmware | =200909 | |
TP-Link TL-WR845N Firmware | =201214 | |
TP-Link WR845N Firmware | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57040 has a high severity due to the presence of a hardcoded password for the root account.
To fix CVE-2024-57040, update your TL-WR845N router to a version that does not contain the hardcoded password.
CVE-2024-57040 affects the TP-Link TL-WR845N routers with firmware versions between V4_190219 and V4_200909.
Yes, CVE-2024-57040 can be exploited easily through brute force attacks to gain unauthorized access to the root account.
The risks associated with CVE-2024-57040 include unauthorized access to the router’s settings, leading to network compromise.