CVE-2025-13399
Weak AES Key Brute Force in VX800v Web Interface Encryption
Publication date: 2026-01-29
Last updated on: 2026-03-09
Assigner: TPLink
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tp-link | vx800v_firmware | to 800.0.11 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-331 | The product uses an algorithm or scheme that produces insufficient entropy, leaving patterns or clusters of values that are more likely to occur than others. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a weakness in the application layer encryption of the web interface in VX800v version 1.0. It allows an attacker who is on the same or adjacent network to brute force the weak AES encryption key and decrypt the intercepted traffic. Exploiting this vulnerability does not require any authentication but does require network proximity.
How can this vulnerability impact me? :
If exploited, this vulnerability can have a high impact on the confidentiality, integrity, and availability of the transmitted data. An attacker could decrypt sensitive information, potentially alter data, or disrupt communication.