Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 23 Apr 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | TP-Link TL-WR841N v13 uses DES-CBC encryption in the TDDPv2 debug protocol with a cryptographic key derived from default web management credentials, making the key predictable if device is left in default configuration. A network-adjacent attacker can exploit this weakness to gain unauthorized access to the protocol, read debug data, modify certain device configuration values, and trigger device reboot, resulting in loss of integrity and a denial-of-service condition. | |
| Title | Predictable Default Cryptographic Key Used for DES Encryption in TP-Link TL-WL841N | |
| Weaknesses | CWE-1394 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-04-23T17:40:28.657Z
Reserved: 2026-03-27T16:26:48.187Z
Link: CVE-2026-5039
Updated: 2026-04-23T17:40:20.340Z
Status : Received
Published: 2026-04-23T18:16:30.377
Modified: 2026-04-23T18:16:30.377
Link: CVE-2026-5039
No data.
OpenCVE Enrichment
No data.