With AES CTR mode, using the same key and nonce to encrypt multiple blocks of data is a huge security breach:
Ciphertext1 = Plaintext1 XOR Key
Ciphertext2 = Plaintext2 XOR Key
XORing the ciphertexts:
Ciphertext1 XOR Ciphertext2 = Plaintext1 XOR Key XOR Plaintext2 XOR Key
This simplifies to
Plaintext1 XOR Plaintext2
This means that if you knew that the first message of the day (plaintext1) was going to be "weather report" then you could work out what the first 14 bytes of ciphertext2 is, because you could XOR "weather report" with the first 14 bytes of ciphertext1, get the first 14 bytes of the key, and them use this to decrypt the first 14 bytes of ciphertext2, and get the first 14 bytes of plaintext2. Other techniques such as what kelalaka suggested can be used to work out the whole message.
The solution: either encrypt the whole lot of data with the key and nonce, or change the nonce per block of data encrypted - maybe use a counter, because the nonce does not have to be unpredictable, but must be unique.