CVE-2025-14738
Improper Authentication in TP-Link WA850RE Allows Config Download
Publication date: 2025-12-18
Last updated on: 2025-12-18
Assigner: TPLink
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tp-link | wa850re | v2 |
| tp-link | wa850re | v3 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an improper authentication flaw in the TP-Link WA850RE Wi-Fi Range Extender's httpd server module. It allows unauthenticated remote attackers to download the device's configuration file without needing to log in. Accessing this file can expose sensitive information such as administrator credentials. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability can allow attackers to obtain the device's configuration file, which may contain sensitive information including administrator credentials. This can lead to unauthorized access to the device, potential network compromise, and further exploitation of connected systems. [1]
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting to access the configuration file of the TP-Link WA850RE device without authentication. A common method is to send an HTTP request to the device's IP address targeting the configuration file endpoint, for example using curl: curl http://<device-ip>/config.bin. If the configuration file is returned without requiring authentication, the device is vulnerable. [1]
What immediate steps should I take to mitigate this vulnerability?
Immediate mitigation steps include updating the device firmware to the latest version provided by TP-Link, as updates addressing this vulnerability are available on TP-Link's official support pages. Additionally, restricting network access to the device's management interface and monitoring for unauthorized access attempts can help reduce risk. [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to download the device's configuration file, exposing sensitive information such as administrator credentials. This exposure of sensitive data could lead to non-compliance with data protection regulations like GDPR and HIPAA, which require safeguarding sensitive information against unauthorized access. Therefore, this vulnerability poses a risk to compliance with such standards by potentially enabling unauthorized data disclosure. [1]