Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-14175
PUBLISHED
More InfoOfficial Page
Assigner-TPLink
Assigner Org ID-f23511db-6c3e-4e32-a477-6aa17d310630
View Known Exploited Vulnerability (KEV) details
Published At-29 Dec, 2025 | 19:31
Updated At-02 Jan, 2026 | 14:18
Rejected At-
▼CVE Numbering Authority (CNA)
Weak Algorithm Support in SSH Server on TL-WR820N

A vulnerability in the SSH server of TP-Link TL-WR820N v2.80 allows the use of a weak cryptographic algorithm, enabling an adjacent attacker to intercept and decrypt SSH traffic. Exploitation may expose sensitive information and compromise confidentiality.

Affected Products
Vendor
TP-Link Systems Inc.
Product
TL-WR820N v2.8
Default Status
unaffected
Versions
Affected
  • From 0 before 1.15.0 Build 250813 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-327CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Type: CWE
CWE ID: CWE-327
Description: CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Metrics
VersionBase scoreBase severityVector
4.06.0MEDIUM
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Version: 4.0
Base score: 6.0
Base severity: MEDIUM
Vector:
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-94CAPEC-94 Adversary in the Middle (AiTM)
CAPEC ID: CAPEC-94
Description: CAPEC-94 Adversary in the Middle (AiTM)
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Vishwa V; Sathya Priya. S; Cybersecurity Lab, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India. vishwaofficials@gmail.com; sathyapriya80@gmail.com
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.tp-link.com/en/support/download/tl-wr820n/#Firmware
patch
https://www.tp-link.com/in/support/download/tl-wr820n/#Firmware
patch
https://www.tp-link.com/us/support/faq/4861/
vendor-advisory
Hyperlink: https://www.tp-link.com/en/support/download/tl-wr820n/#Firmware
Resource:
patch
Hyperlink: https://www.tp-link.com/in/support/download/tl-wr820n/#Firmware
Resource:
patch
Hyperlink: https://www.tp-link.com/us/support/faq/4861/
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found