Overview
Description
TP-Link TL-WR841N dropbearpwd Improper Authentication Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of TP-Link TL-WR841N routers. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the httpd service, which listens on TCP port 80 by default. The issue results from improper authentication. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise.
. Was ZDI-CAN-19899.
Statistics
- 1 Post
Last activity: 7 hours ago
Overview
Description
This CVE is a duplicate of CVE-2025-55182.
Statistics
- 1 Post
Last activity: 20 hours ago
Overview
Description
This candidate has been reserved by a CVE Numbering Authority (CNA). This record will be updated by the assigning CNA once details are available.
Statistics
- 1 Post
Last activity: 4 hours ago
Fediverse
Huh, I somehow missed this CVE:
https://mastodon.social/@verbrecher/115720201828646496
Thx to for the pointer @verbrecher
CVE-2025-14174 is related to this commit in the ANGLE repo:
https://github.com/google/angle/commit/95a32cb37edbb90eac0b83727b38fedbbb32307b
For CVE-2025-43529 there's much less info.
Overview
Description
The authenticated remote command execution (RCE) vulnerability exists in the Parental Control page on TP-Link Archer C7(EU) V2 and TL-WR841N/ND(MS) V9.
This issue affects Archer C7(EU) V2: before 241108 and TL-WR841N/ND(MS) V9: before 241108.
Both products have reached the status of EOL (end-of-life).
It's recommending to
purchase the new
product to ensure better performance and security. If replacement is not
an option in the short term, please use the second reference link to
download and install the patch(es).
Statistics
- 1 Post
Last activity: 7 hours ago