Click to skip the navigation bar

Statement on Hardcoded DES Decryption Keys in TP-Link Archer C50 V3/V4/V5 and C20 V5 (CVE-2025-6982)

Security Advisory
Last updated: April 22, 2026

Important Information:

These devices have reached end-of-life (EOL); therefore, please review the ‘Recommendation(s)’ section carefully.

Vulnerability Description:

Use of Hard-coded Credentials in TP-Link Archer C20 V5 and C50 V3( <= 180703)/V4( <= 250117 )/V5( <= 200407 ), allows attackers to decrypt the config.xml file.

Impact:

This Hardcoded DES Decryption Keys may be used to decrypt the user config file.

CVSS v4.0 Score: 6.9 / Medium

CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Product Model

Related Vulnerabilities

Affected Version

TP-Link Archer C50 V3

CVE-2025-6982

<= 180703

TP-Link Archer C50 V4

CVE-2025-6982

<= 250117

TP-Link Archer C50 V5

CVE-2025-6982

<= 200407

TP-Link Archer C20 V5

CVE-2025-6982

< US_V5_260419

< EU_V5_260317

Recommendation(s):

We strongly recommended that users with the affected device(s) take the following action(s):

  1. Upgrade the device to one of our supported models to be able to receive automatic updates for ongoing protection.
  2. For C20 V5, download and update to the latest firmware to fix the vulnerabilities.

EN: Download for Archer C20 | TP-Link

US: Download for Archer C20 | TP-Link

Disclaimer:

If you do not take the recommended action(s) stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended action(s) in this statement.

Looking For More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >