Security Advisory on Weak Algorithm Support in SSH Server on TL-WR820N (CVE-2025-14175)
Vulnerability Description:
A vulnerability in the SSH server of TP-Link TL-WR820N v2.80 allows the use of a weak cryptographic algorithm, enabling an adjacent attacker to intercept and decrypt SSH traffic.
Impacts:
Exploitation may expose sensitive information and compromise confidentiality.
CVSS v4.0 Score: 6 / Medium
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Products/Versions and Fixes:
|
Affected Product Model |
Related Vulnerabilities |
Affected Version |
|
TL-WR820N V2.80 |
CVE-2025-14175 |
< 1.15.0 Build 250813 |
Note: This product is not sold in the US market.
Recommendation(s):
We strongly recommend that users with the affected device(s) take the following action(s):
- Download and update to the latest firmware version to fix these vulnerabilities:
Download for TL-WR820N (India)
Disclaimer:
If you do not take the recommended actions stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this statement.
這篇faq是否有用?
您的反饋將幫助我們改善網站