Click to skip the navigation bar

Security Advisory on Vulnerabilities in TP-Link Archer BE400 V1 (CVE-2025-14631)

Security Advisory
更新01-07-2026 01:01:35 AM Number of views for this article2601

Vulnerabilities Description:

A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1 (802.11 modules) allows an adjacent attacker to cause a denial-of-service (DoS) by triggering a device reboot.

Impacts:

This vulnerability may allow the attacker within the wireless range to perform a denial-of-service (DoS) attack to the device.

CVSS v4.0 Score: 7.1 / High

CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Product Model

Related Vulnerabilities

Affected Version

Archer BE400

CVE-2025-14631

<= 1.1.0 Build 20250710 rel.14914

Recommendation(s):

We strongly recommend that users with the affected device(s) take the following action(s):

  1. Download and update to the latest firmware version to fix these vulnerabilities:

https://www.tp-link.com/us/support/download/archer-be400/#Firmware

https://www.tp-link.com/en/support/download/archer-be400/v1/#Firmware

Disclaimer:

If you do not take the recommended actions stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this statement.

更多相關文章

這篇faq是否有用?

您的反饋將幫助我們改善網站