The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-4346

CVE-2026-4346: TL-WR850N Router Information Disclosure

CVE-2026-4346 is an information disclosure flaw in TL-WR850N v3 that exposes admin and Wi-Fi credentials through physical access to the serial interface. This article covers technical details, impact, and mitigations.

Published: March 27, 2026

CVE-2026-4346 Overview

CVE-2026-4346 is a cleartext storage vulnerability affecting the TP-Link TL-WR850N v3 router. The device stores administrative and Wi-Fi credentials in cleartext within a region of the device's flash memory. Additionally, the serial interface remains enabled and is protected only by weak authentication mechanisms.

An attacker with physical access to the device who can connect to the serial port can recover sensitive information, including the router's management password and wireless network key. Successful exploitation can lead to full administrative control of the device and unauthorized access to the associated wireless network.

Critical Impact

Physical attackers can extract cleartext administrative credentials and Wi-Fi passwords from flash memory via the serial interface, enabling complete device takeover and wireless network compromise.

Affected Products

  • TP-Link TL-WR850N v3

Discovery Timeline

  • 2026-03-26 - CVE-2026-4346 published to NVD
  • 2026-03-26 - Last updated in NVD database

Technical Details for CVE-2026-4346

Vulnerability Analysis

This vulnerability falls under CWE-312 (Cleartext Storage of Sensitive Information). The core issue is that the TL-WR850N v3 stores sensitive credentials—specifically the router administrative password and wireless network key—without any encryption or obfuscation in the device's flash memory.

The vulnerability is compounded by two additional security weaknesses: the serial interface on the device remains enabled in production units, and this interface is protected only by weak authentication. This combination creates a viable attack path for anyone with physical access to the router hardware.

Exploitation requires physical access to the device and the ability to interact with the serial interface. Once connected, an attacker can read the flash memory contents and extract the plaintext credentials. This provides immediate access to the router's administrative panel as well as the wireless network itself.

Root Cause

The root cause of this vulnerability is improper handling of sensitive data storage. The device firmware stores administrative and wireless credentials in cleartext rather than using appropriate encryption or secure storage mechanisms. Additionally, the debug serial interface was left enabled in production firmware without adequate access controls, violating secure development practices for IoT devices.

Attack Vector

The attack vector for CVE-2026-4346 requires physical access to the TP-Link TL-WR850N v3 device. An attacker would need to:

  1. Gain physical access to the router
  2. Identify and connect to the serial interface pins on the device's circuit board
  3. Bypass or authenticate through the weak serial interface protection
  4. Access the flash memory region where credentials are stored
  5. Extract the cleartext administrative password and Wi-Fi key

While physical access limits the pool of potential attackers, this vulnerability is particularly concerning in environments where routers may be accessible to untrusted parties, such as shared office spaces, rental properties, or public installations.

Detection Methods for CVE-2026-4346

Indicators of Compromise

  • Unauthorized administrative access to the router's management interface
  • Changes to router configuration without administrator knowledge
  • Unknown devices appearing on the wireless network
  • Physical evidence of tampering with the router enclosure or circuit board

Detection Strategies

  • Monitor for unauthorized administrative logins to the router management portal
  • Implement network monitoring to detect unexpected configuration changes
  • Track all devices connecting to the wireless network and alert on unknown MAC addresses
  • Conduct periodic physical security audits of network equipment locations

Monitoring Recommendations

  • Enable logging on the router if supported and forward logs to a central SIEM
  • Set up alerts for administrative credential changes or factory reset events
  • Monitor for unusual network traffic patterns that may indicate compromised access
  • Implement physical security measures such as locked enclosures for network equipment

How to Mitigate CVE-2026-4346

Immediate Actions Required

  • Place the router in a physically secure location inaccessible to untrusted individuals
  • Review router logs for any unauthorized administrative access
  • Change administrative and Wi-Fi passwords immediately if physical tampering is suspected
  • Consider replacing vulnerable devices in high-risk environments

Patch Information

Check the TP-Link Firmware Download page for updated firmware that may address this vulnerability. Additionally, consult the TP-Link Support FAQ for guidance on securing your device.

Workarounds

  • Secure the router in a locked cabinet or enclosure to prevent physical access
  • Disable remote management features if not required
  • Implement network segmentation to limit the impact of a compromised router
  • Consider deploying additional monitoring solutions to detect unauthorized access attempts
  • Evaluate upgrading to a router model with hardware-encrypted credential storage

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechTplink

  • SeverityMEDIUM

  • CVSS Score5.1

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:P/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-312
  • Technical References
  • TP-Link Firmware Download

  • TP-Link Support FAQ
  • Related CVEs
  • CVE-2025-15557: TP-Link Tapo Certificate Vulnerability

  • CVE-2026-3622: TL-WR841N UPnP DoS Vulnerability

  • CVE-2026-1571: TP-Link Archer C60 v3 XSS Vulnerability

  • CVE-2026-0651: TP-Link Tapo C260 Path Traversal Flaw
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English