This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR940N routers. Authentication is not required to exploit this vulnerability. The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from the incorrect implementation of the authentication algorithm. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-WR940N V2 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-17332 is considered high due to its potential for sensitive information disclosure.
To fix ZDI-CAN-17332, update your TP-Link TL-WR940N router to the latest firmware version provided by the manufacturer.
Network-adjacent attackers can exploit ZDI-CAN-17332 without requiring authentication.
ZDI-CAN-17332 is a vulnerability that allows for the disclosure of sensitive information.
ZDI-CAN-17332 specifically affects TP-Link TL-WR940N routers.