CVE-2026-5039

TP-Link TL-WR841N v13 uses DES-CBC encryption in the TDDPv2 debug protocol with a cryptographic key derived from default web management credentials, making the key predictable if device is left in default configuration. A network-adjacent attacker can exploit this weakness to gain unauthorized access to the protocol, read debug data, modify certain device configuration values, and trigger device reboot, resulting in loss of integrity and a denial-of-service condition.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tl-wr841n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr841n:13.0:*:*:*:*:*:*:*

History

05 May 2026, 14:11

Type Values Removed Values Added
CPE cpe:2.3:h:tp-link:tl-wr841n:13.0:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr841n_firmware:*:*:*:*:*:*:*:*
First Time Tp-link
Tp-link tl-wr841n
Tp-link tl-wr841n Firmware
References () https://www.tp-link.com/us/support/download/tl-wr841n/v13/#Firmware - () https://www.tp-link.com/us/support/download/tl-wr841n/v13/#Firmware - Product
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.8

23 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-23 18:16

Updated : 2026-05-05 14:11


NVD link : CVE-2026-5039

Mitre link : CVE-2026-5039

CVE.ORG link : CVE-2026-5039


JSON object : View

Products Affected

tp-link

  • tl-wr841n
  • tl-wr841n_firmware
CWE
CWE-1394

Use of Default Cryptographic Key