First published: Tue Nov 14 2023(Updated: )
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR902AC routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WR902AC |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-23-1623 is rated as high due to the potential for sensitive information disclosure.
To fix ZDI-23-1623, it is recommended to update the firmware of the TP-Link TL-WR902AC router to the latest version.
The vulnerability ZDI-23-1623 affects all installations of the TP-Link TL-WR902AC routers.
Yes, ZDI-23-1623 can be exploited by network-adjacent attackers without the need for authentication.
ZDI-23-1623 is an information disclosure vulnerability found in the httpd service of TP-Link TL-WR902AC routers.