Security Advisory on Vulnerabilities in TP-Link Archer BE400 V1 (CVE-2025-14631)
Vulnerabilities Description:
A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1 (802.11 modules) allows an adjacent attacker to cause a denial-of-service (DoS) by triggering a device reboot.
Impacts:
This vulnerability may allow the attacker within the wireless range to perform a denial-of-service (DoS) attack to the device.
CVSS v4.0 Score: 7.1 / High
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
Affected Products/Versions and Fixes:
|
Affected Product Model |
Related Vulnerabilities |
Affected Version |
|
Archer BE400 |
CVE-2025-14631 |
<= 1.1.0 Build 20250710 rel.14914 |
Recommendation(s):
We strongly recommend that users with the affected device(s) take the following action(s):
- Download and update to the latest firmware version to fix these vulnerabilities:
https://www.tp-link.com/us/support/download/archer-be400/#Firmware
https://www.tp-link.com/en/support/download/archer-be400/v1/#Firmware
Disclaimer:
If you do not take the recommended actions stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this statement.
這篇faq是否有用?
您的反饋將幫助我們改善網站