APromptRiskDBThreat intelligence atlas
AI Vulnerability Context

CVE-2023-50224 - TP-Link TL-WR841N

TP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

AI Vulnerability ContextCISA KEVTP-Link

Record summary

A quick snapshot of what this page covers.

CISA KEVyesWhether CISA lists this as exploited.
Techniques0AI attack methods connected to this vulnerability.
Case studies0Examples where this vulnerability is mentioned.

Vulnerability status

How serious this vulnerability is and whether it is known to be exploited.

CISA KEV
CVE ID
CVE-2023-50224
Vendor/project
TP-Link
Product
TL-WR841N
Vulnerability name
TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability
Date added
2025-09-03
Due date
2025-09-24
Known ransomware campaign use
Unknown
CWE-290

Exploit context

What the vulnerability is about.

No description available. The source record only contains identifiers and metadata.

Source

Where this page information comes from.