Tl Wr845n Firmware

2 CVEs product

Monthly

CVE-2025-15551 MEDIUM This Month

The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. [CVSS 5.6 MEDIUM]

TP-Link Tl Wr850n Firmware Tl Wr845n Firmware Archer Mr200 Firmware Archer C20 Firmware
NVD
CVSS 3.1
5.6
EPSS
0.1%
CVE-2024-57040 CRITICAL Act Now

TL-WR845N(UN)_V4_200909 and TL-WR845N(UN)_V4_190219 was discovered to contain a hardcoded password for the root account which can be obtained by analyzing downloaded firmware or via a brute force. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Tl Wr845n Firmware
NVD
CVSS 3.1
9.8
EPSS
8.5%
CVE-2025-15551
EPSS 0% CVSS 5.6
MEDIUM This Month

The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. [CVSS 5.6 MEDIUM]

TP-Link Tl Wr850n Firmware Tl Wr845n Firmware +2
NVD
CVE-2024-57040
EPSS 8% CVSS 9.8
CRITICAL Act Now

TL-WR845N(UN)_V4_200909 and TL-WR845N(UN)_V4_190219 was discovered to contain a hardcoded password for the root account which can be obtained by analyzing downloaded firmware or via a brute force. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. No vendor patch available.

Authentication Bypass Tl Wr845n Firmware
NVD

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy