CVE-2025-15543

N/A Unknown

📋 TL;DR

This vulnerability allows an attacker with physical access to a TP-Link VX800v v1.0 device to read system files by connecting a specially crafted USB device. The improper link resolution in the USB HTTP access path exposes root filesystem contents, potentially revealing sensitive configuration data. Only users of the specific TP-Link VX800v v1.0 device are affected.

💻 Affected Systems

Products:
  • TP-Link VX800v
Versions: v1.0
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with USB ports accessible to attackers. The vulnerability is in the USB HTTP access functionality.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with physical access could extract sensitive system files, configuration data, credentials, or encryption keys, potentially enabling further attacks or system compromise.

🟠

Likely Case

An attacker with brief physical access could read configuration files, potentially obtaining network credentials or device management information.

🟢

If Mitigated

With proper physical security controls, the risk is minimal as physical access is required for exploitation.

🌐 Internet-Facing: LOW - This vulnerability requires physical USB device access, not network access.
🏢 Internal Only: MEDIUM - Physical access to the device is required, which could occur in office environments or data centers.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical access and a specially crafted USB device. No authentication is required once the USB device is connected.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check TP-Link support site for latest firmware

Vendor Advisory: https://www.tp-link.com/us/support/faq/4930/

Restart Required: Yes

Instructions:

1. Visit TP-Link support site for VX800v. 2. Download latest firmware. 3. Log into device web interface. 4. Navigate to System Tools > Firmware Upgrade. 5. Upload and install new firmware. 6. Device will reboot automatically.

🔧 Temporary Workarounds

Disable USB HTTP access

all

Disable the USB HTTP access functionality if not needed

Physical security controls

all

Restrict physical access to USB ports using locks or enclosures

🧯 If You Can't Patch

  • Physically secure the device in locked cabinets or restricted access areas
  • Disconnect or disable USB ports if not required for operation

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in web interface under System Tools > Firmware Upgrade. If version is v1.0, device is vulnerable.

Check Version:

Check web interface at System Tools > Firmware Upgrade or use SSH/Telnet if enabled

Verify Fix Applied:

After firmware update, verify version is no longer v1.0. Test with USB device to confirm root filesystem is not accessible via HTTP.

📡 Detection & Monitoring

Log Indicators:

  • Unusual USB device connections
  • HTTP requests to USB access paths
  • File access attempts to system directories

Network Indicators:

  • HTTP requests to USB-related endpoints from unexpected sources

SIEM Query:

source="vx800v-logs" AND (event="usb_connection" OR url_path="/usb/*")

🔗 References

📤 Share & Export