PT-2025-6737 · Tp Link · Tp-Link Wr840N V6

Shuanunio

·

Published

2025-02-18

·

Updated

2025-04-07

·

CVE-2024-57050

CVSS v3.1

10

Critical

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions TP-Link WR840N V6 router versions 0.9.1 4.16 and earlier
Description A vulnerability in the TP-Link WR840N V6 router permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding a Referer header with the value http://tplinkwifi.net to the request, it will be recognized as passing the authentication.
Recommendations For TP-Link WR840N V6 router versions 0.9.1 4.16 and earlier, consider disabling access to the /cgi directory until a patch is available. Restrict access to the router's web interface to minimize the risk of exploitation. Avoid using the Referer header with the value http://tplinkwifi.net in requests to the router's web interface until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

Improper Authentication

Weakness Enumeration

Related Identifiers

BDU:2025-02222
CVE-2024-57050

Affected Products

Tp-Link Wr840N V6