CVE-2025-14631
NULL Pointer Dereference in TP-Link Archer BE400 Causes DoS
Publication date: 2026-01-07
Last updated on: 2026-03-12
Assigner: TPLink
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tp-link | archer_be400_firmware | to 1.1.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-476 | The product dereferences a pointer that it expects to be valid but is NULL. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a NULL Pointer Dereference in the TP-Link Archer BE400 V1 802.11 modules. It allows an adjacent attacker to cause a denial-of-service (DoS) by triggering a device reboot.
What immediate steps should I take to mitigate this vulnerability?
To mitigate the CVE-2025-14631 vulnerability, you should immediately update your TP-Link Archer BE400 V1 router to the latest firmware version available from TP-Link's official support pages. Applying the latest firmware will fix the NULL Pointer Dereference issue that allows an adjacent attacker to cause a denial-of-service by triggering device reboots. Failure to update leaves the device vulnerable to DoS attacks. [2]
How can this vulnerability impact me? :
The vulnerability can impact you by causing a denial-of-service condition on the affected device, resulting in the device rebooting unexpectedly and potentially disrupting network connectivity or services relying on the device.