First published: Tue Dec 19 2023(Updated: )
This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WR841N |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-23-1808 has been classified as a high severity vulnerability due to its ability to allow network-adjacent attackers to disclose sensitive information.
To fix ZDI-23-1808, users should update their TP-Link TL-WR841N router to the latest firmware version provided by TP-Link.
ZDI-23-1808 specifically affects TP-Link TL-WR841N routers with a flaw in the httpd service listening on TCP port 80.
No, ZDI-23-1808 can be exploited without any authentication, making it particularly dangerous.
Through ZDI-23-1808, attackers can disclose sensitive information from affected TP-Link TL-WR841N router installations.