Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 05 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link tl-wr841n
Tp-link tl-wr841n Firmware |
|
| CPEs | cpe:2.3:h:tp-link:tl-wr841n:13.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr841n_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link tl-wr841n
Tp-link tl-wr841n Firmware |
|
| Metrics |
cvssV3_1
|
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link tl-wl841n |
|
| Vendors & Products |
Tp-link
Tp-link tl-wl841n |
Thu, 23 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TP-Link TL-WR841N v13 uses DES-CBC encryption in the TDDPv2 debug protocol with a cryptographic key derived from default web management credentials, making the key predictable if device is left in default configuration. A network-adjacent attacker can exploit this weakness to gain unauthorized access to the protocol, read debug data, modify certain device configuration values, and trigger device reboot, resulting in loss of integrity and a denial-of-service condition. | |
| Title | Predictable Default Cryptographic Key Used for DES Encryption in TP-Link TL-WL841N | |
| Weaknesses | CWE-1394 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-04-28T17:45:30.438Z
Reserved: 2026-03-27T16:26:48.187Z
Link: CVE-2026-5039
Updated: 2026-04-23T17:40:20.340Z
Status : Analyzed
Published: 2026-04-23T18:16:30.377
Modified: 2026-05-05T14:11:58.700
Link: CVE-2026-5039
No data.
OpenCVE Enrichment
Updated: 2026-04-28T15:00:14Z