A vulnerability in the SSH server of TP-Link TL-WR820N v2.80 allows the use of a weak cryptographic algorithm, enabling an adjacent attacker to intercept and decrypt SSH traffic. Exploitation may expose sensitive information and compromise confidentiality.
References
| Link | Resource |
|---|---|
| https://www.tp-link.com/en/support/download/tl-wr820n/#Firmware | Product |
| https://www.tp-link.com/in/support/download/tl-wr820n/#Firmware | Product |
| https://www.tp-link.com/us/support/faq/4861/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
08 Mar 2026, 01:49
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:h:tp-link:tl-wr820n:2.80:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr820n_firmware:*:*:*:*:*:*:*:* |
|
| References | () https://www.tp-link.com/en/support/download/tl-wr820n/#Firmware - Product | |
| References | () https://www.tp-link.com/in/support/download/tl-wr820n/#Firmware - Product | |
| References | () https://www.tp-link.com/us/support/faq/4861/ - Vendor Advisory | |
| First Time |
Tp-link
Tp-link tl-wr820n Tp-link tl-wr820n Firmware |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
29 Dec 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-29 20:15
Updated : 2026-03-08 01:49
NVD link : CVE-2025-14175
Mitre link : CVE-2025-14175
CVE.ORG link : CVE-2025-14175
JSON object : View
Products Affected
tp-link
- tl-wr820n
- tl-wr820n_firmware
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm
