9.8
CVSSv3

CVE-2024-57040

CVSSv4: NA | CVSSv3: 9.8 | CVSSv2: NA | VMScore: 1000 | EPSS: 0.01722 | KEV: Not Included
Published: 26/02/2025 Updated: 07/04/2025

Vulnerability Summary

Hardcoded Root Password Vulnerability in TP-Link TL-WR845N Router Firmware

A hardcoded root account password vulnerability exists in TP-Link TL-WR845N(UN) version 4 firmware releases from September 2009 and February 2019. An attacker can obtain the hardcoded password by performing a brute force attack, potentially gaining unauthorized root-level access to the device.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tp-link tl-wr845n firmware 190219

tp-link tl-wr845n firmware 200909

tp-link tl-wr845n firmware 201214

Github Repositories

CVE-2024-57040 is a security vulnerability found in certain TP-Link TL-WR845N router models. Specifically, it involves a "hardcoded" password for the router's root account. This means a default, unchanging password is built into the router's software.

Poc-CVE-2024-57040 CVE-2024-57040 is a security vulnerability found in certain TP-Link TL-WR845N router models Specifically, it involves a "hardcoded" password for the router's root account This means a default, unchanging password is built into the router's software Affected Devices: The vulnerability affects these firmware versions: TL-WR845N(UN)_V4_19