CVE-2025-13399

N/A Unknown

📋 TL;DR

A vulnerability in the TP-Link VX800v v1.0 web interface allows attackers on the same network to brute-force weak AES encryption keys and decrypt intercepted traffic. This affects confidentiality, integrity, and availability of transmitted data. Only users of this specific device version are impacted.

💻 Affected Systems

Products:
  • TP-Link VX800v
Versions: v1.0
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with the vulnerable firmware version; requires attacker to be on the same network segment.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of all encrypted communications, allowing attackers to read, modify, or block sensitive data transmitted through the device.

🟠

Likely Case

Attackers decrypt intercepted traffic to steal credentials, session tokens, or sensitive information transmitted through the web interface.

🟢

If Mitigated

Limited impact if strong network segmentation prevents adjacent attackers or if traffic is additionally encrypted at higher layers.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network adjacency and ability to intercept traffic; brute-forcing weak keys is computationally feasible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.tp-link.com/us/support/faq/4930/

Restart Required: No

Instructions:

Check TP-Link support page for firmware updates; if unavailable, consider workarounds or replacement.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate VX800v devices on separate VLANs to limit adjacent attack surface.

Disable Web Interface

all

Turn off web management interface if not required, using alternative management methods.

🧯 If You Can't Patch

  • Replace device with a model that uses strong encryption or has patched firmware.
  • Implement additional encryption layer (e.g., VPN) for all traffic passing through the device.

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or CLI; if version is v1.0, it is vulnerable.

Check Version:

Login to web interface and check System Info or use manufacturer's CLI command if available.

Verify Fix Applied:

Verify firmware version is updated beyond v1.0 per vendor guidance.

📡 Detection & Monitoring

Log Indicators:

  • Unusual login attempts
  • Multiple failed decryption attempts in logs if logged

Network Indicators:

  • Unusual traffic patterns to/from VX800v
  • Brute-force attempts against network services

SIEM Query:

Search for repeated connection attempts to VX800v web interface from internal IPs.

🔗 References

📤 Share & Export