Description
The executable httpd on the TP-Link WR841N V8 router before TL-WR841N(UN)_V8_170210 contained a design flaw in the use of DES for block encryption. This resulted in incorrect access control, which allowed attackers to gain read-write access to system settings through the protected router configuration service tddp via the LAN and Ath0 (Wi-Fi) interfaces.
Published: 2017-06-26
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2017-18398 The executable httpd on the TP-Link WR841N V8 router before TL-WR841N(UN)_V8_170210 contained a design flaw in the use of DES for block encryption. This resulted in incorrect access control, which allowed attackers to gain read-write access to system settings through the protected router configuration service tddp via the LAN and Ath0 (Wi-Fi) interfaces.
History

No history.

Subscriptions

Tp-link Wr841n V8 Wr841n V8 Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T17:11:01.527Z

Reserved: 2017-06-06T00:00:00.000Z

Link: CVE-2017-9466

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-06-26T07:29:00.340

Modified: 2026-05-13T00:24:29.033

Link: CVE-2017-9466

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses