{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-50224","assignerOrgId":"99f1926a-a320-47d8-bbb5-42feb611262e","state":"PUBLISHED","assignerShortName":"zdi","dateReserved":"2023-12-05T16:15:17.543Z","datePublished":"2024-05-03T02:14:42.922Z","dateUpdated":"2025-10-21T23:05:19.610Z"},"containers":{"cna":{"providerMetadata":{"orgId":"99f1926a-a320-47d8-bbb5-42feb611262e","shortName":"zdi","dateUpdated":"2024-09-18T18:30:34.804Z"},"title":"TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability","descriptions":[{"lang":"en","value":"TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.\n. Was ZDI-CAN-19899."}],"affected":[{"vendor":"TP-Link","product":"TL-WR841N","versions":[{"version":"3.16.9 build 200409","status":"affected"}],"defaultStatus":"unknown"}],"problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-290","description":"CWE-290: Authentication Bypass by Spoofing","type":"CWE"}]}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-1808/","name":"ZDI-23-1808","tags":["x_research-advisory"]},{"url":"https://www.tp-link.com/en/support/download/tl-wr841n/v12/#Firmware","name":"vendor-provided URL","tags":["vendor-advisory"]}],"dateAssigned":"2023-12-05T19:37:59.697Z","datePublic":"2023-12-19T16:08:15.018Z","source":{"lang":"en","value":"Aleksandar Djurdjevic 'revengsmK'"},"metrics":[{"format":"CVSS","cvssV3_0":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM"}}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2023-50224","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2025-09-03T03:55:22.977218Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2025-09-03","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-50224"}}}],"affected":[{"cpes":["cpe:2.3:o:tp-link:tl-wr841n_firmware:-:*:*:*:*:*:*:*"],"vendor":"tp-link","product":"tl-wr841n_firmware","versions":[{"status":"affected","version":"0","lessThan":"12.0","versionType":"custom"}],"defaultStatus":"unknown"}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2023-50224","tags":["government-resource"]}],"timeline":[{"time":"2025-09-03T00:00:00.000Z","lang":"en","value":"CVE-2023-50224 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T23:05:19.610Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T22:09:49.801Z"},"title":"CVE Program Container","references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-23-1808/","name":"ZDI-23-1808","tags":["x_research-advisory","x_transferred"]},{"url":"https://www.tp-link.com/en/support/download/tl-wr841n/v12/#Firmware","name":"vendor-provided URL","tags":["vendor-advisory","x_transferred"]}]}]}}