Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15548: CWE-311 Missing Encryption of Sensitive Data in TP-Link Systems Inc. VX800v v1.0

0
Medium
VulnerabilityCVE-2025-15548cvecve-2025-15548cwe-311
Published: Thu Jan 29 2026 (01/29/2026, 18:07:08 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: VX800v v1.0

Description

Some VX800v v1.0 web interface endpoints transmit sensitive information over unencrypted HTTP due to missing application layer encryption, allowing a network adjacent attacker to intercept this traffic and compromise its confidentiality.

AI-Powered Analysis

AILast updated: 01/29/2026, 18:42:39 UTC

Technical Analysis

CVE-2025-15548 identifies a vulnerability classified under CWE-311 (Missing Encryption of Sensitive Data) affecting TP-Link Systems Inc.'s VX800v v1.0 device. The issue arises because certain web interface endpoints transmit sensitive information over unencrypted HTTP rather than using secure protocols like HTTPS or other application-layer encryption. This design flaw enables an attacker positioned on the same or adjacent network segment to perform passive network interception (e.g., via ARP spoofing or Wi-Fi eavesdropping) to capture sensitive data in transit. The vulnerability does not require any authentication, user interaction, or elevated privileges, making it easier to exploit in environments where network access is shared or insufficiently protected. The CVSS 4.0 vector (AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N) reflects that the attack vector is adjacent network, with low attack complexity and no privileges or user interaction needed, but the impact is limited to confidentiality. No known exploits have been reported yet, and no patches are currently available. The affected product version is VX800v v1.0, with no other versions listed. This vulnerability highlights the importance of encrypting sensitive data in transit to prevent interception and unauthorized disclosure.

Potential Impact

For European organizations, the primary impact is the potential compromise of sensitive information transmitted by the VX800v v1.0 device. This could include configuration details, credentials, or other confidential data exposed via the device's web interface. The confidentiality breach could facilitate further attacks such as unauthorized access, lateral movement within networks, or data exfiltration. Organizations operating in environments with shared networks, such as corporate offices, public Wi-Fi, or multi-tenant facilities, are particularly vulnerable. The lack of encryption undermines trust in the device's security posture and may violate data protection regulations like GDPR if personal or sensitive data is exposed. While the vulnerability does not directly affect integrity or availability, the indirect consequences of data leakage could be significant. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is widely known.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first verify if they are using the affected VX800v v1.0 devices and assess their network exposure. Since no patches are currently available, immediate steps include: 1) Restrict network access to the device's web interface by implementing strict firewall rules and network segmentation to limit access to trusted administrators only. 2) Use VPNs or secure tunnels when accessing the device remotely to ensure encryption of data in transit. 3) Disable or restrict use of the vulnerable web interface endpoints if possible, or replace the device with a more secure model that enforces encrypted communications. 4) Monitor network traffic for signs of interception or unusual activity around the device. 5) Educate network administrators about the risks of unencrypted management interfaces and enforce policies requiring encrypted management protocols. 6) Stay informed about vendor updates or patches and apply them promptly once available. These steps go beyond generic advice by focusing on network-level controls and operational practices tailored to the specific device and vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-26T21:21:46.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697ba6a4ac06320222aacef0

Added to database: 1/29/2026, 6:27:48 PM

Last enriched: 1/29/2026, 6:42:39 PM

Last updated: 1/29/2026, 8:18:06 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats