CVE-2026-5039
Predictable Default Cryptographic Key Used for DES Encryption in TP-Link TL-WL841N
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
TP-Link TL-WR841N v13 uses DES-CBC encryption in the TDDPv2 debug protocol with a cryptographic key derived from default web management credentials, making the key predictable if device is left in default configuration. A network-adjacent attacker can exploit this weakness to gain unauthorized access to the protocol, read debug data, modify certain device configuration values, and trigger device reboot, resulting in loss of integrity and a denial-of-service condition.
| CWE | CWE-1394 |
| Vendor | tp-link systems inc. |
| Product | tl-wl841n v13 |
| Published | Apr 23, 2026 |
| Last Updated | Apr 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for tp-link systems inc. tl-wl841n v13
Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. tl-wl841n v13 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
TP-Link Systems Inc. / TL-WL841N v13
0 < 0.9.1 Build 20231120 Rel.62366