The vulnerability affecting TL-WR850N v3 allows cleartext storage of administrative and Wi-Fi credentials in a region of the device’s flash memory while the serial interface remains enabled and protected by weak authentication. An attacker with physical access and the ability to connect to the serial port can recover sensitive information, including the router’s management password and wireless network key.
Successful exploitation can lead to full administrative control of the device and unauthorized access to the associated wireless network.
References
| Link | Resource |
|---|---|
| https://www.tp-link.com/in/support/download/tl-wr850n/#Firmware | Product |
| https://www.tp-link.com/us/support/faq/5034/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
31 Mar 2026, 19:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.tp-link.com/in/support/download/tl-wr850n/#Firmware - Product | |
| References | () https://www.tp-link.com/us/support/faq/5034/ - Vendor Advisory | |
| CPE | cpe:2.3:h:tp-link:tl-wr850n:3:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr850n_firmware:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
| First Time |
Tp-link
Tp-link tl-wr850n Tp-link tl-wr850n Firmware |
30 Mar 2026, 13:26
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
26 Mar 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-26 22:16
Updated : 2026-03-31 19:09
NVD link : CVE-2026-4346
Mitre link : CVE-2026-4346
CVE.ORG link : CVE-2026-4346
JSON object : View
Products Affected
tp-link
- tl-wr850n
- tl-wr850n_firmware
CWE
CWE-312
Cleartext Storage of Sensitive Information
