Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400

0
High
VulnerabilityCVE-2025-14631cvecve-2025-14631cwe-476
Published: Wed Jan 07 2026 (01/07/2026, 01:04:26 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer BE400

Description

A NULL Pointer Dereference vulnerability in TP-Link Archer BE400 V1(802.11 modules) allows  an adjacent attacker to cause a denial-of-service (DoS) by triggering a device reboot. This issue affects Archer BE400: xi 1.1.0 Build 20250710 rel.14914.

AI-Powered Analysis

AILast updated: 01/07/2026, 01:33:50 UTC

Technical Analysis

CVE-2025-14631 is a NULL Pointer Dereference vulnerability classified under CWE-476 found in the TP-Link Archer BE400 V1 802.11 wireless modules. The flaw exists in the firmware version xi 1.1.0 Build 20250710 rel.14914 and can be exploited by an adjacent attacker—meaning an attacker within wireless range—to cause a denial-of-service condition by triggering a device reboot. This vulnerability does not require any authentication, user interaction, or privileges, making it relatively straightforward to exploit. The root cause is the dereferencing of a NULL pointer, which leads to a crash of the affected process or the entire device, resulting in a reboot and temporary loss of network availability. The CVSS 4.0 base score is 7.1, indicating a high severity due to the ease of exploitation (attack vector: adjacent network), lack of required privileges or user interaction, and the high impact on availability. No known exploits have been reported in the wild, and no official patches or firmware updates have been published by TP-Link at the time of this report. The vulnerability specifically affects the Archer BE400 model, which is a consumer-grade Wi-Fi 6 USB adapter widely used in home and small office environments. The issue could be leveraged by attackers to disrupt network connectivity, potentially impacting business operations relying on stable wireless connections.

Potential Impact

For European organizations, the primary impact of CVE-2025-14631 is on network availability and operational continuity. The vulnerability allows an attacker within wireless range to cause repeated device reboots, leading to denial-of-service conditions. This can disrupt critical communications, remote work, and access to network resources, especially in environments relying on the Archer BE400 for wireless connectivity. Organizations in sectors such as finance, healthcare, and government, where network uptime is critical, may experience operational delays and reduced productivity. Additionally, repeated device crashes could lead to increased support costs and potential exposure to secondary attacks during downtime. Although the vulnerability does not directly compromise confidentiality or integrity, the loss of availability can have cascading effects on business processes and service delivery. European enterprises using this device in dense urban or office environments are particularly vulnerable due to the ease of proximity-based exploitation.

Mitigation Recommendations

Until an official patch or firmware update is released by TP-Link, organizations should implement several targeted mitigations: 1) Restrict wireless access to trusted devices by enabling strong Wi-Fi encryption (WPA3 if supported) and using MAC address filtering to limit exposure. 2) Segment wireless networks to isolate critical systems from general user devices, reducing the attack surface. 3) Monitor network traffic and device logs for unusual reboot patterns or wireless anomalies that may indicate exploitation attempts. 4) Physically secure devices to prevent unauthorized proximity access, especially in public or semi-public areas. 5) Consider temporarily replacing or supplementing Archer BE400 adapters with alternative hardware not affected by this vulnerability in sensitive environments. 6) Engage with TP-Link support channels to obtain updates on patch availability and apply firmware updates promptly once released. 7) Educate users about the risk of connecting to untrusted wireless networks and the importance of reporting connectivity issues promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-12-12T21:55:15.121Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695db4a0ee4c93a4aad5f9e7

Added to database: 1/7/2026, 1:19:28 AM

Last enriched: 1/7/2026, 1:33:50 AM

Last updated: 1/8/2026, 5:11:27 AM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats