Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14175: CWE-327 Use of a Broken or Risky Cryptographic Algorithm in TP-Link Systems Inc. TL-WR820N v2.8

0
Medium
VulnerabilityCVE-2025-14175cvecve-2025-14175cwe-327
Published: Mon Dec 29 2025 (12/29/2025, 19:31:23 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: TL-WR820N v2.8

Description

A vulnerability in the SSH server of TP-Link TL-WR820N v2.80 allows the use of a weak cryptographic algorithm, enabling an adjacent attacker to intercept and decrypt SSH traffic. Exploitation may expose sensitive information and compromise confidentiality.

AI-Powered Analysis

AILast updated: 01/07/2026, 00:28:43 UTC

Technical Analysis

CVE-2025-14175 identifies a cryptographic vulnerability in the SSH server implementation of the TP-Link TL-WR820N version 2.8 router. The vulnerability arises from the use of weak or broken cryptographic algorithms within the SSH service, classified under CWE-327. This cryptographic weakness allows an attacker with adjacent network access—meaning they must be on the same local network or within wireless range—to intercept and decrypt SSH traffic between clients and the router. The vulnerability does not require authentication or user interaction, increasing its risk profile for local attackers. The CVSS 4.0 vector indicates an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. The lack of patches or known exploits suggests this is a newly disclosed issue. The root cause is the inclusion of outdated or weak cryptographic algorithms in the SSH server, which undermines the confidentiality guarantees typically provided by SSH. Exploiting this vulnerability could allow attackers to capture sensitive credentials or configuration data transmitted over SSH, potentially leading to further compromise of the device or network. The affected product is a widely used consumer-grade router model, often deployed in small office or home office environments. The vulnerability's scope is limited to the specific firmware version 2.8 of the TL-WR820N device. Given the nature of the weakness, attackers would need to be physically or logically close to the target device, such as connected to the same Wi-Fi network or LAN segment.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality of management traffic on affected TP-Link TL-WR820N routers. If exploited, attackers could intercept SSH sessions used for device administration, potentially capturing credentials or sensitive configuration data. This could lead to unauthorized access to the router, enabling further network compromise, data exfiltration, or disruption. Organizations relying on these routers in small office or home office settings, or in environments where network segmentation is weak, are particularly vulnerable. The medium severity rating reflects the limited attack vector but high confidentiality impact. Critical infrastructure or enterprises using these devices for remote management could face increased risks, especially if the routers are deployed in sensitive network zones. The vulnerability does not affect integrity or availability directly but can serve as a stepping stone for more severe attacks. The absence of patches increases exposure duration, and the lack of known exploits reduces immediate risk but does not eliminate it. Overall, the threat could undermine trust in network device security and complicate compliance with data protection regulations such as GDPR if sensitive data is exposed.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately assess the deployment of TP-Link TL-WR820N v2.8 routers within their networks and identify devices running the vulnerable firmware. 2) Disable SSH access on these routers if it is not strictly necessary for device management. 3) If SSH is required, restrict access to trusted management hosts via firewall rules or VLAN segmentation to prevent adjacent attackers from accessing the SSH service. 4) Monitor network traffic for unusual SSH session activity or signs of interception attempts, using network intrusion detection systems capable of detecting weak cryptographic usage. 5) Encourage TP-Link to release firmware updates that remove or replace weak cryptographic algorithms; apply such patches promptly once available. 6) Consider replacing vulnerable devices with models that have updated and secure cryptographic implementations if patching is not feasible. 7) Educate network administrators about the risks of weak cryptography and the importance of secure device configurations. 8) Implement strong network segmentation and wireless security controls to limit attacker proximity. These steps go beyond generic advice by focusing on network access controls, monitoring, and vendor engagement specific to this vulnerability and device.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-12-06T00:22:01.470Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b2db813ff03e2bee67

Added to database: 12/30/2025, 10:22:42 PM

Last enriched: 1/7/2026, 12:28:43 AM

Last updated: 2/7/2026, 6:24:04 AM

Views: 50

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats