Security Advisory on Vulnerabilities in TP-Link Archer BE400 V1 (CVE-2025-14631)
Vulnerabilities Description:
A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1 (802.11 modules) allows an adjacent attacker to cause a denial-of-service (DoS) by triggering a device reboot.
Impacts:
This vulnerability may allow the attacker within the wireless range to perform a denial-of-service (DoS) attack to the device.
CVSS v4.0 Score: 7.1 / High
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products/Versions and Fixes:
|
Affected Product Model |
Related Vulnerabilities |
Affected Version |
|
Archer BE400 |
CVE-2025-14631 |
<= 1.1.0 Build 20250710 rel.14914 |
Recommendation(s):
We strongly recommend that users with the affected device(s) take the following action(s):
- Download and update to the latest firmware version to fix these vulnerabilities:
https://www.tp-link.com/us/support/download/archer-be400/#Firmware
https://www.tp-link.com/en/support/download/archer-be400/v1/#Firmware
Disclaimer:
If you do not take the recommended actions stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this statement.
Is this faq useful?
Your feedback helps improve this site.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.