Home / Vulnerabilities / CVE-2023-50224
MEDIUM SEVERITY
CVE-2023-50224 TP-Link · TL-WR841N

TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability

Technical Severity

CVSS v3.1 Metrics

MEDIUM
6.5 / 10
Minimal Risk Critical
Vector Specification
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Exploitation Likelihood

EPSS Prediction

1.46 %
Predictive Probability
Percentile Rank
80.5 th

Documented as more likely to be exploited than 80.5% of known CVEs.

Detection Date

Sep 03, 2025

Remediation Due

Sep 24, 2025

CISA Catalog Active

Threat Analysis

TP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Remediation Directive

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

External Intelligence