Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-57040

EPSS 5.73% · P91
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-57040

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
TP-Link TL-WR845N devices with firmware TL-WR845N(UN)_V4_200909 and TL-WR845N(UN)_V4_190219 was discovered to contain a hardcoded password for the root account which can be obtained by analyzing downloaded firmware or via a brute force attack through physical access to the router. NOTE: The supplier has stated that this issue was fixed in firmware versions 250401 or later.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
TP-LINK WR845N 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TP-LINK WR845N是中国普联(TP-LINK)公司的一款无线路由器。 TP-LINK WR845N存在安全漏洞,该漏洞源于root账户使用了硬编码密码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2024-57040

#POC DescriptionSource LinkShenlong Link
1CVE-2024-57040 is a security vulnerability found in certain TP-Link TL-WR845N router models. Specifically, it involves a "hardcoded" password for the router's root account. This means a default, unchanging password is built into the router's software.https://github.com/absholi7ly/Poc-CVE-2024-57040POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-57040

登录查看更多情报信息。

Same Patch Batch · n/a · 2025-02-26 · 34 CVEs total

CVE-2024-50689SunGrow iSolarCloud 安全漏洞
CVE-2025-25791YznCMS 安全漏洞
CVE-2025-25793SeaCMS 安全漏洞
CVE-2025-25462PHPGurukul Land Record System 安全漏洞
CVE-2024-46226HelpDeskZ 跨站脚本漏洞
CVE-2024-50685SunGrow iSolarCloud 安全漏洞
CVE-2024-50686SunGrow iSolarCloud 安全漏洞
CVE-2024-50684SunGrow iSolarCloud 安全漏洞
CVE-2024-50687SunGrow iSolarCloud 安全漏洞
CVE-2025-25789FoxCMS 安全漏洞
CVE-2024-50688SunGrow iSolarCloud 安全漏洞
CVE-2024-50691SunGrow iSolarCloud 安全漏洞
CVE-2024-50693SunGrow iSolarCloud 安全漏洞
CVE-2024-57423CloudClassroom-PHP-Project 安全漏洞
CVE-2024-50696SunGrow WiNet-S 安全漏洞
CVE-2024-53573Unifiedtransform 安全漏洞
CVE-2024-55581AdaCore Ada Web Server 安全漏洞
CVE-2025-25792SeaCMS 安全漏洞
CVE-2025-25800SeaCMS 路径遍历漏洞
CVE-2025-25797SeaCMS 安全漏洞

Showing top 20 of 34 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2024-57040

No comments yet


Leave a comment