Click to skip the navigation bar

Security Advisory for CVE-2023-50224 – Impact on Legacy TP-Link Router and Access Point Products

Security Advisory
Updated 04-09-2026 00:24:59 AM Number of views for this article6181

TP-Link is aware of recent public reporting and law-enforcement disclosures describing exploitation activity involving legacy consumer networking devices, including TP-Link routers and access points, in connection with CVE-2023-50224.

CVSS v3.0 Score: 6.5 / Medium

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

TP-Link has conducted an internal review and identified that multiple legacy TP-Link products may be affected by this vulnerability. All the affected products have reached End-of-Life (EOL) status and no longer within TP-Link’s standard maintenance lifecycle.

This advisory provides information on impacted legacy models, current remediation status where applicable, and recommended mitigation for customers:

Affected Products/Versions and Fixes:

Product Model

Affected Hardware / Firmware Versions

Current Remediation Status

Fixed Versions

Routers

TL- MR6400

V1 / V2

Unpatched

Archer C5

V2

Unpatched

Archer C7

V2 / V3

Partially patched

V2_241108: Download for Archer C7 | TP-Link

TL-WDR3600

V2

Unpatched

TL-WDR4300

V1

Unpatched

TL-WDR3500

V2

Unpatched

TL-WR740N

V4–V7

Unpatched

TL-WR741ND

V4-V6

Unpatched

TL-WR749N

BR 6.0 / 7.0

Unpatched

TL-MR3420

V2–V4

Unpatched

TL-WR1043ND

V2–V4

Unpatched

TL-WR1045ND

RU V2

Unpatched

TL-WR840N

V2 / V3

Unpatched

TL-WR841N

TL-WR841ND

V8–V12

Partially patched

V11_211209: Download for TL-WR841N | TP-Link

V12_230317: Download for TL-WR841N | TP-Link

TL-WR842N

TL-WR842ND

V2–V4

Unpatched

TL-WR845N

V1 / V2

Unpatched

TL-WR941ND

V5 / V6

Partially patched

V6_220610: Download for TL-WR941ND | TP-Link

TL-WR945N

V1

Unpatched

Access Points

TL-WA801ND

V3 / V4

Unpatched

TL-WA901ND

V3–V5

Partially patched

V4_201030, V5_201030:

Descarga para TL-WA901ND | TP-Link España

Download for TL-WA901ND | TP-Link

Important Note on Scope

The product list above reflects TP-Link’s current assessment based on available information and ongoing analysis. The list may not be exhaustive, and additional legacy models, hardware revisions, or regional variants may be identified.

A complete End-of-Life product list is available here: TP-Link End of Life Products

Vulnerability Description and Impact:

Improper authentication flaw allows network-adjacent attackers to retrieve sensitive information in httpd service. Successful exploitation may disclose stored credentials, leading to further compromise. Public reporting indicates this vulnerability may be actively exploited in the wild, including in campaigns involving DNS manipulation. TP‑Link continues to monitor available threat intelligence and external reporting.

Remediation Status

  • Some affected legacy products have received security updates where technically feasible.
  • Due to hardware limitations, platform age, and lack of available test units, not all legacy products can receive patches.
  • None of the affected models support cloud‑based or automatic firmware updates. Any available patches require manual installation by the user.

TP‑Link continues to evaluate the feasibility of additional updates for certain legacy products. Any updates that become available will be published on TP‑Link’s official support website and reflected in this advisory.

Recommendations:

TP‑Link strongly recommends that customers using affected or potentially affected legacy devices take the following actions immediately:

  1. Upgrade to a supported TP‑Link product that receives regular security updates.
  2. If continued use of a legacy device is unavoidable:
    • Install the latest available firmware from the official TP‑Link website.
    • Disable remote management and unnecessary services.
    • Restrict device access to trusted internal networks only.
  3. Monitor network activity for unusual DNS behavior or unauthorized configuration changes.

Disclaimer:

This advisory is provided for informational purposes only and reflects TP‑Link’s current assessment based on available information.

The affected products listed are legacy devices that have reached End‑of‑Life (EOL) and are outside TP‑Link’s standard maintenance lifecycle. While TP‑Link provides mitigation guidance to help reduce risk, customers are responsible for assessing their own environments and determining appropriate actions.

Continued use of affected legacy devices may expose networks to security risks. TP‑Link strongly recommends migrating to supported products that receive regular security updates.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >