Click to skip the navigation bar

Security Advisory on Vulnerabilities in TP-Link Archer BE400 V1 (CVE-2025-14631)

Security Advisory
Updated 01-07-2026 01:01:35 AM Number of views for this article661

Vulnerabilities Description:

A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1 (802.11 modules) allows an adjacent attacker to cause a denial-of-service (DoS) by triggering a device reboot.

Impacts:

This vulnerability may allow the attacker within the wireless range to perform a denial-of-service (DoS) attack to the device.

CVSS v4.0 Score: 7.1 / High

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Product Model

Related Vulnerabilities

Affected Version

Archer BE400

CVE-2025-14631

<= 1.1.0 Build 20250710 rel.14914

Recommendation(s):

We strongly recommend that users with the affected device(s) take the following action(s):

  1. Download and update to the latest firmware version to fix these vulnerabilities:

https://www.tp-link.com/us/support/download/archer-be400/#Firmware

https://www.tp-link.com/en/support/download/archer-be400/v1/#Firmware

Disclaimer:

If you do not take the recommended actions stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this statement.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >