CVE-2026-0655: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in TP-Link Systems Inc. Deco BE25 v1.0
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in TP-Link Deco BE25 v1.0 (web modules) allows authenticated adjacent attacker to read arbitrary files or cause denial of service. This issue affects Deco BE25 v1.0: through 1.1.1 Build 20250822.
AI Analysis
Technical Summary
CVE-2026-0655 is a path traversal vulnerability categorized under CWE-22 affecting TP-Link Deco BE25 v1.0 web modules. This vulnerability stems from improper validation and limitation of file pathnames, allowing an authenticated attacker with high privileges on an adjacent network to manipulate file paths to access files outside the intended directory scope. This can lead to unauthorized reading of arbitrary files, potentially exposing sensitive configuration or system files, or cause denial of service by accessing or manipulating critical files. The vulnerability affects Deco BE25 firmware versions up to 1.1.1 Build 20250822. Exploitation requires the attacker to be authenticated with high privileges, but no user interaction is needed. The CVSS 4.0 vector (AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:L) reflects that the attack vector is adjacent network, with low attack complexity, no attack or user interaction required, and high impact on confidentiality and availability. No patches or exploits are currently publicly available, but the issue is published and should be addressed promptly. The vulnerability could be leveraged to compromise device integrity and confidentiality, impacting network security and device availability.
Potential Impact
The vulnerability allows an attacker with authenticated high privileges on an adjacent network to read arbitrary files or cause denial of service on the affected TP-Link Deco BE25 devices. This can lead to exposure of sensitive information such as configuration files, credentials, or logs, potentially enabling further attacks or lateral movement within a network. Denial of service could disrupt network connectivity or degrade device functionality, impacting business operations relying on these devices. Given the medium severity and requirement for authentication, the risk is moderate but significant in environments where Deco BE25 devices are widely deployed, especially in enterprise or critical infrastructure networks. The impact on confidentiality and availability can affect organizational security posture, compliance, and operational continuity.
Mitigation Recommendations
Organizations should implement the following specific mitigations: 1) Restrict administrative access to Deco BE25 devices to trusted and secure networks only, minimizing exposure to adjacent attackers. 2) Enforce strong authentication and access controls to prevent unauthorized high-privilege access. 3) Monitor network traffic for unusual file access patterns or denial of service symptoms on Deco BE25 devices. 4) Apply firmware updates or patches from TP-Link as soon as they become available to address this vulnerability. 5) Consider network segmentation to isolate Deco BE25 devices from untrusted or less secure network segments. 6) Conduct regular security audits and vulnerability scans on network devices to detect similar path traversal or access control issues. 7) Educate network administrators on the risks of path traversal vulnerabilities and the importance of secure configuration.
Affected Countries
United States, China, Germany, United Kingdom, India, Brazil, Australia, Canada, France, Japan, South Korea
CVE-2026-0655: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in TP-Link Systems Inc. Deco BE25 v1.0
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in TP-Link Deco BE25 v1.0 (web modules) allows authenticated adjacent attacker to read arbitrary files or cause denial of service. This issue affects Deco BE25 v1.0: through 1.1.1 Build 20250822.
AI-Powered Analysis
Technical Analysis
CVE-2026-0655 is a path traversal vulnerability categorized under CWE-22 affecting TP-Link Deco BE25 v1.0 web modules. This vulnerability stems from improper validation and limitation of file pathnames, allowing an authenticated attacker with high privileges on an adjacent network to manipulate file paths to access files outside the intended directory scope. This can lead to unauthorized reading of arbitrary files, potentially exposing sensitive configuration or system files, or cause denial of service by accessing or manipulating critical files. The vulnerability affects Deco BE25 firmware versions up to 1.1.1 Build 20250822. Exploitation requires the attacker to be authenticated with high privileges, but no user interaction is needed. The CVSS 4.0 vector (AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:L) reflects that the attack vector is adjacent network, with low attack complexity, no attack or user interaction required, and high impact on confidentiality and availability. No patches or exploits are currently publicly available, but the issue is published and should be addressed promptly. The vulnerability could be leveraged to compromise device integrity and confidentiality, impacting network security and device availability.
Potential Impact
The vulnerability allows an attacker with authenticated high privileges on an adjacent network to read arbitrary files or cause denial of service on the affected TP-Link Deco BE25 devices. This can lead to exposure of sensitive information such as configuration files, credentials, or logs, potentially enabling further attacks or lateral movement within a network. Denial of service could disrupt network connectivity or degrade device functionality, impacting business operations relying on these devices. Given the medium severity and requirement for authentication, the risk is moderate but significant in environments where Deco BE25 devices are widely deployed, especially in enterprise or critical infrastructure networks. The impact on confidentiality and availability can affect organizational security posture, compliance, and operational continuity.
Mitigation Recommendations
Organizations should implement the following specific mitigations: 1) Restrict administrative access to Deco BE25 devices to trusted and secure networks only, minimizing exposure to adjacent attackers. 2) Enforce strong authentication and access controls to prevent unauthorized high-privilege access. 3) Monitor network traffic for unusual file access patterns or denial of service symptoms on Deco BE25 devices. 4) Apply firmware updates or patches from TP-Link as soon as they become available to address this vulnerability. 5) Consider network segmentation to isolate Deco BE25 devices from untrusted or less secure network segments. 6) Conduct regular security audits and vulnerability scans on network devices to detect similar path traversal or access control issues. 7) Educate network administrators on the risks of path traversal vulnerabilities and the importance of secure configuration.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- TPLink
- Date Reserved
- 2026-01-06T18:29:34.354Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69a5d050b6c0d8506fbcb7c3
Added to database: 3/2/2026, 6:00:48 PM
Last enriched: 3/2/2026, 6:04:23 PM
Last updated: 3/2/2026, 10:39:32 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2583: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in creativethemeshq Blocksy
MediumCVE-2026-3338: CWE-347 (Improper Verification of Cryptographic Signature) in AWS AWS-LC
HighCVE-2026-3337: CWE-208 (Observable Timing Discrepancy) in AWS AWS-LC
MediumCVE-2026-3336: CWE-295 (Improper Certificate Validation) in AWS AWS-LC
HighCVE-2026-2256: CWE-94 Improper Control of Generation of Code ('Code Injection') in ModelScope ms-agent
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.