Description
A vulnerability in the SSH server of TP-Link TL-WR820N v2.80 allows the use of a weak cryptographic algorithm, enabling an adjacent attacker to intercept and decrypt SSH traffic. Exploitation may expose sensitive information and compromise confidentiality.
Problem types
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
Product status
Any version before 1.15.0 Build 250813
Credits
Vishwa V; Sathya Priya. S; Cybersecurity Lab, SRM Institute of Science and Technology, Ramapuram, Chennai, Tamil Nadu, India. vishwaofficials@gmail.com; sathyapriya80@gmail.com
References
www.tp-link.com/en/support/download/tl-wr820n/
www.tp-link.com/in/support/download/tl-wr820n/
www.tp-link.com/us/support/faq/4861/
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.