Vulnerability Description
TP-Link TL-WR841N v13 uses DES-CBC encryption in the TDDPv2 debug protocol with a cryptographic key derived from default web management credentials, making the key predictable if device is left in default configuration. A network-adjacent attacker can exploit this weakness to gain unauthorized access to the protocol, read debug data, modify certain device configuration values, and trigger device reboot, resulting in loss of integrity and a denial-of-service condition.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Tl-Wr841N Firmware | < 231120 |
| Tp-Link | Tl-Wr841N | 13.0 |
Related Weaknesses (CWE)
References
FAQ
What is CVE-2026-5039?
CVE-2026-5039 is a vulnerability with a CVSS score of 8.8 (HIGH). TP-Link TL-WR841N v13 uses DES-CBC encryption in the TDDPv2 debug protocol with a cryptographic key derived from default web management credentials, making the key predictable if device is left in def...
How severe is CVE-2026-5039?
CVE-2026-5039 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5039?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Tl-Wr841N Firmware, Tp-Link Tl-Wr841N.