CVE-2023-50224
Known Exploited Vulnerability Entry External Catalog
Entry Details
Confirmed
Yes
2025-09-03 00:00 UTC
Timestamps
2025-09-03
2025-09-03
Scope
KEV entry: TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability | Affected: TP-Link / TL-WR841N | Description: TP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization. | Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. | Due date: 2025-09-24 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://www.tp-link.com/us/support/faq/4308/ ; https://nvd.nist.gov/vuln/detail/CVE-2023-50224
References
- {'id': 'CVE-2023-50224', 'url': 'https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-50224'}
356b258f-8fdb-469b-a0e2-b4675e1cb139
405284c2-e461-4670-8979-7fd2c9755a60
2026-02-02 12:25 UTC
2026-02-02 12:25 UTC
Evidence (1)
| Type | Source | Signal | Confidence | Details | GCVE Metadata |
|---|---|---|---|---|---|
| vendor_report | cisa-kev | successful_exploitation | 0.80 |
View details
|
- |