PT-2025-6737 · Tp Link · Tp-Link Wr840N V6
Shuanunio
·
Published
2025-02-18
·
Updated
2025-04-07
·
CVE-2024-57050
CVSS v3.1
10
Critical
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
TP-Link WR840N V6 router versions 0.9.1 4.16 and earlier
Description
A vulnerability in the TP-Link WR840N V6 router permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding a
Referer header with the value http://tplinkwifi.net to the request, it will be recognized as passing the authentication.Recommendations
For TP-Link WR840N V6 router versions 0.9.1 4.16 and earlier, consider disabling access to the
/cgi directory until a patch is available. Restrict access to the router's web interface to minimize the risk of exploitation. Avoid using the Referer header with the value http://tplinkwifi.net in requests to the router's web interface until the issue is resolved. At the moment, there is no information about a newer version that contains a fix for this vulnerability.Exploit
Improper Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Tp-Link Wr840N V6