CVE-2025-15541

N/A Unknown

📋 TL;DR

This vulnerability in TP-Link VX800v v1.0 SFTP service allows authenticated attackers on the same network to create symbolic links that bypass directory restrictions, potentially accessing sensitive system files. Only users with SFTP access to affected devices are impacted, but the attack requires network adjacency.

💻 Affected Systems

Products:
  • TP-Link VX800v
Versions: v1.0
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects SFTP service functionality; requires attacker to have valid SFTP credentials and be on the same network segment.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could read sensitive system files containing credentials, configuration data, or cryptographic keys, potentially leading to full device compromise.

🟠

Likely Case

Attackers with SFTP credentials can access files outside the intended directory, potentially reading configuration files or other sensitive data.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to isolated network segments with minimal sensitive data exposure.

🌐 Internet-Facing: LOW (SFTP service typically not exposed to internet, requires authenticated adjacent access)
🏢 Internal Only: MEDIUM (Requires authenticated access but can be exploited by malicious insiders or compromised accounts on same network)

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated SFTP access and ability to create symbolic links, which is typically available to SFTP users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check TP-Link support site for latest firmware

Vendor Advisory: https://www.tp-link.com/us/support/faq/4930/

Restart Required: Yes

Instructions:

1. Visit TP-Link support page for VX800v. 2. Download latest firmware. 3. Log into device web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Device will reboot automatically.

🔧 Temporary Workarounds

Disable SFTP Service

all

Temporarily disable SFTP service if not required for operations

Check device web interface under Services or File Sharing settings

Restrict SFTP Access

all

Limit SFTP access to specific trusted IP addresses only

Configure firewall rules on device or upstream firewall to restrict SFTP port (typically 22) access

🧯 If You Can't Patch

  • Segment network to isolate VX800v devices from untrusted systems
  • Implement strict access controls and monitor SFTP logs for unusual activity

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device web interface under System Tools > Firmware Version

Check Version:

Check via web interface or SSH if enabled: show version or similar command

Verify Fix Applied:

Verify firmware version matches latest version from TP-Link support site and test SFTP symbolic link creation restrictions

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed SFTP login attempts
  • SFTP sessions accessing unusual file paths
  • Symbolic link creation in SFTP logs

Network Indicators:

  • Unusual SFTP traffic patterns from internal sources
  • SFTP connections attempting to access system directories

SIEM Query:

source="vx800v_logs" AND (event="sftp_access" AND path="*system*" OR event="symlink_creation")

🔗 References

📤 Share & Export