๐Ÿ” CVE Alert

CVE-2026-5039

UNKNOWN 0.0

Predictable Default Cryptographic Key Used for DES Encryption in TP-Link TL-WL841N

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

TP-Link TL-WR841N v13 uses DES-CBC encryption in the TDDPv2 debug protocol with a cryptographic key derived from default web management credentials, making the key predictable if device is left in default configuration. A network-adjacent attacker can exploit this weakness to gain unauthorized access to the protocol, read debug data, modify certain device configuration values, and trigger device reboot, resulting in loss of integrity and a denial-of-service condition.

CWE CWE-1394
Vendor tp-link systems inc.
Product tl-wl841n v13
Published Apr 23, 2026
Last Updated Apr 23, 2026
Stay Ahead of the Next One

Get instant alerts for tp-link systems inc. tl-wl841n v13

Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. tl-wl841n v13 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

TP-Link Systems Inc. / TL-WL841N v13
0 < 0.9.1 Build 20231120 Rel.62366

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
tp-link.com: https://www.tp-link.com/us/support/download/tl-wr841n/v13/#Firmware