Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 04 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link axe75 |
|
| Vendors & Products |
Tp-link
Tp-link axe75 |
Tue, 03 Feb 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When configured as L2TP/IPSec VPN server, Archer AXE75 V1 may accept connections using L2TP without IPSec protection, even when IPSec is enabled. This allows VPN sessions without encryption, exposing data in transit and compromising confidentiality. | |
| Title | L2TP over IPSec Encryption Failure on ArcherAXE75 | |
| Weaknesses | CWE-693 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-02-04T20:46:15.816Z
Reserved: 2026-01-05T19:17:01.519Z
Link: CVE-2026-0620
Updated: 2026-02-04T20:46:10.241Z
Status : Awaiting Analysis
Published: 2026-02-03T19:16:15.580
Modified: 2026-02-04T16:33:44.537
Link: CVE-2026-0620
No data.
OpenCVE Enrichment
Updated: 2026-02-04T12:08:48Z