CVE-2023-50224
CISA KEVPublished September 3, 2025 · Updated April 3, 2026
high
Official Description+
TP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.
Affected Products
| Vendor | Product |
|---|---|
| TP-Link | TL-WR841N |
Patch Status
Patch by 2025-09-24
Recommended Actions
- Check if your systems use any of the affected products listed above.
- Apply vendor patches immediately if available.
- This vulnerability is in CISA's Known Exploited Vulnerabilities catalog — prioritize remediation.
- Monitor vendor advisories for updates and additional mitigations.
- Review logs for indicators of compromise related to CVE-2023-50224.