CVE-2025-14738
Unknown Unknown - Not Provided
Improper Authentication in TP-Link WA850RE Allows Config Download

Publication date: 2025-12-18

Last updated on: 2025-12-18

Assigner: TPLink

Description
Improper authentication vulnerability in TP-Link WA850RE (httpd modules) allows unauthenticated attackers to download the configuration file.This issue affects: ≀ WA850RE V2_160527, ≀ WA850RE V3_160922.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-18
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
tp-link wa850re v2
tp-link wa850re v3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an improper authentication flaw in the TP-Link WA850RE Wi-Fi Range Extender's httpd server module. It allows unauthenticated remote attackers to download the device's configuration file without needing to log in. Accessing this file can expose sensitive information such as administrator credentials. [1]


How can this vulnerability impact me? :

If exploited, this vulnerability can allow attackers to obtain the device's configuration file, which may contain sensitive information including administrator credentials. This can lead to unauthorized access to the device, potential network compromise, and further exploitation of connected systems. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to access the configuration file of the TP-Link WA850RE device without authentication. A common method is to send an HTTP request to the device's IP address targeting the configuration file endpoint, for example using curl: curl http://<device-ip>/config.bin. If the configuration file is returned without requiring authentication, the device is vulnerable. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the device firmware to the latest version provided by TP-Link, as updates addressing this vulnerability are available on TP-Link's official support pages. Additionally, restricting network access to the device's management interface and monitoring for unauthorized access attempts can help reduce risk. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to download the device's configuration file, exposing sensitive information such as administrator credentials. This exposure of sensitive data could lead to non-compliance with data protection regulations like GDPR and HIPAA, which require safeguarding sensitive information against unauthorized access. Therefore, this vulnerability poses a risk to compliance with such standards by potentially enabling unauthorized data disclosure. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart