First published: Tue Feb 18 2025(Updated: )
A vulnerability in the TP-Link WR840N v6 router with firmware version 0.9.1 4.16 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory.When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-LINK TL-WR840N | <0.9.1 4.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-57050 is considered a medium severity vulnerability due to the potential for unauthorized access to sensitive interfaces.
To fix CVE-2024-57050, upgrade the TP-Link WR840N router firmware to a version later than 0.9.1 4.16.
CVE-2024-57050 affects the TP-Link WR840N v6 router with firmware version 0.9.1 4.16 and earlier.
The implications of CVE-2024-57050 include the risk of unauthorized individuals accessing sensitive router settings and potentially compromising the network.
A workaround for CVE-2024-57050 is to restrict access to the router's web interface and not expose it to untrusted networks until a firmware upgrade can be applied.