Security Advisory on Weak Algorithm Support in SSH Server on TL-WR820N (CVE-2025-14175)
Vulnerability Description:
A vulnerability in the SSH server of TP-Link TL-WR820N v2.80 allows the use of a weak cryptographic algorithm, enabling an adjacent attacker to intercept and decrypt SSH traffic.
Impacts:
Exploitation may expose sensitive information and compromise confidentiality.
CVSS v4.0 Score: 6 / Medium
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Products/Versions and Fixes:
|
Affected Product Model |
Related Vulnerabilities |
Affected Version |
|
TL-WR820N V2.80 |
CVE-2025-14175 |
< 1.15.0 Build 250813 |
Note: This product is not sold in the US market.
Recommendation(s):
We strongly recommend that users with the affected device(s) take the following action(s):
- Download and update to the latest firmware version to fix these vulnerabilities:
Download for TL-WR820N (India)
Disclaimer:
If you do not take the recommended actions stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this statement.
Is this faq useful?
Your feedback helps improve this site.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.