CVE-2025-13399
Unknown Unknown - Not Provided
Weak AES Key Brute Force in VX800v Web Interface Encryption

Publication date: 2026-01-29

Last updated on: 2026-03-09

Assigner: TPLink

Description
A weakness in the web interface’s application layer encryption in VX800v v1.0 allows an adjacent attacker to brute force the weak AES key and decrypt intercepted traffic. Successful exploitation requires network proximity but no authentication, and may result in high impact to confidentiality, integrity, and availability of transmitted data.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-29
Last Modified
2026-03-09
Generated
2026-05-07
AI Q&A
2026-01-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tp-link vx800v_firmware to 800.0.11 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-331 The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a weakness in the application layer encryption of the web interface in VX800v version 1.0. It allows an attacker who is on the same or adjacent network to brute force the weak AES encryption key and decrypt the intercepted traffic. Exploiting this vulnerability does not require any authentication but does require network proximity.


How can this vulnerability impact me? :

If exploited, this vulnerability can have a high impact on the confidentiality, integrity, and availability of the transmitted data. An attacker could decrypt sensitive information, potentially alter data, or disrupt communication.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart