Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15548: CWE-311 Missing Encryption of Sensitive Data in TP-Link Systems Inc. VX800v v1.0

0
Medium
VulnerabilityCVE-2025-15548cvecve-2025-15548cwe-311
Published: Thu Jan 29 2026 (01/29/2026, 18:07:08 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: VX800v v1.0

Description

Some VX800v v1.0 web interface endpoints transmit sensitive information over unencrypted HTTP due to missing application layer encryption, allowing a network adjacent attacker to intercept this traffic and compromise its confidentiality.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 11:19:27 UTC

Technical Analysis

CVE-2025-15548 is a vulnerability identified in TP-Link Systems Inc.'s VX800v version 1.0, where certain web interface endpoints transmit sensitive data over unencrypted HTTP connections. This issue stems from missing application layer encryption (CWE-311), meaning that sensitive information such as credentials, configuration data, or session tokens could be exposed in plaintext on the network. The vulnerability is exploitable by an attacker positioned on the same or adjacent network segment (e.g., local LAN or Wi-Fi) who can intercept HTTP traffic between the user and the device. Because no authentication or user interaction is required, the attacker can passively capture data simply by monitoring network traffic. The CVSS 4.0 vector indicates the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no privileges or user interaction needed, and limited impact confined to confidentiality (VC:L). The vulnerability does not affect integrity or availability. No patches or fixes have been published yet, and no known exploits are reported in the wild. The device affected is the VX800v v1.0, a TP-Link product likely used in networking or IoT contexts. The lack of encryption means sensitive data could be intercepted by attackers, potentially leading to further compromise or unauthorized access if credentials or tokens are exposed. This vulnerability highlights the importance of encrypting sensitive data in transit, especially on management interfaces of network devices.

Potential Impact

For European organizations, the primary impact of CVE-2025-15548 is the potential compromise of sensitive information transmitted between users and TP-Link VX800v devices. This could include administrative credentials, configuration details, or session tokens, which if intercepted, may allow attackers to gain unauthorized access or control over the device. Such access could lead to network reconnaissance, lateral movement, or disruption of services. Organizations with VX800v devices deployed in critical infrastructure, enterprise networks, or sensitive environments face increased risk. The vulnerability is particularly concerning in environments with shared or untrusted networks, such as corporate Wi-Fi, public access points, or multi-tenant facilities common in European urban centers. Although the vulnerability does not directly impact system integrity or availability, the confidentiality breach could be a stepping stone for more severe attacks. The absence of patches increases exposure duration, necessitating compensating controls. Overall, the impact is moderate but significant for organizations relying on these devices for network management or connectivity.

Mitigation Recommendations

1. Immediately segment networks to isolate VX800v devices from untrusted or public network segments, restricting access to trusted administrators only. 2. Disable or restrict access to the vulnerable web interface endpoints transmitting data over HTTP, if possible, or disable the web management interface entirely if not required. 3. Use VPNs or secure tunnels to access device management interfaces, ensuring encryption at the transport layer. 4. Monitor network traffic for unencrypted HTTP communications involving VX800v devices and investigate any suspicious activity. 5. Implement strict network access controls and 802.1X authentication to limit network adjacency exposure. 6. Regularly audit device configurations and update firmware when patches become available from TP-Link. 7. Educate network administrators about the risks of unencrypted management interfaces and enforce strong password policies to reduce the impact if credentials are intercepted. 8. Consider replacing VX800v devices with models that support encrypted management protocols if feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-26T21:21:46.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697ba6a4ac06320222aacef0

Added to database: 1/29/2026, 6:27:48 PM

Last enriched: 2/14/2026, 11:19:27 AM

Last updated: 3/24/2026, 8:27:48 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses