
[CIVN-2026-0158] Multiple Vulnerabilities in TP-Link router
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in TP-Link router
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Systems Affected
Archer NX200 v1.0 versions below 1.8.0 Build 260311
Archer NX200 v2.0 versions below 1.3.0 Build 260311
Archer NX200 v2.20 versions below 1.3.0 Build 260311
Archer NX200 v3.0 versions below 1.3.0 Build 260309
Archer NX210 v2.0 versions below 1.3.0 Build 260311
Archer NX210 v2.20 versions below 1.3.0 Build 260311
Archer NX210 v3.0 versions below 1.3.0 Build 260309
Archer NX500 v1.0 versions below 1.3.0 Build 260311
Archer NX500 v2.0 versions below 1.5.0 Build 260309
Archer NX600 v1.0 versions below 1.4.0 Build 260311
Archer NX600 v2.0 versions below 1.3.0 Build 260311
Archer NX600 v3.0 versions below 1.3.0 Build 260309
Overview
Multiple vulnerabilities have been reported in TP-Link Archer NX200, NX210, NX500, and NX600 routers which could allow the attacker to perform unauthorized privileged HTTP actions, potentially leading to arbitrary modification or tampering of the device¿s configuration data.
Target Audience:
All organizations and individuals using TP-Link Archer router.
Risk Assessment:
High risks of service interruption and unauthorized access.
Impact Assessment:
Potential impact on confidentiality, integrity and availability of the system.
Description
1. Authorization Bypass Vulnerability ( CVE-2025-15517 )
A vulnerability exists in the TP-Link Archer NX200, NX210, NX500, and NX600 routers due to a missing authentication check in the HTTP server for certain CGI endpoints. This vulnerability could exploit by unauthenticated us-ers to access functionality intended only for authenticated users.
Successful exploitation of this vulnerability could enable an attacker to per-form privileged HTTP actions without authentication, including firmware up-loads and configuration changes.
2. Command Injection Vulnerability ( CVE-2025-15518 CVE-2025-15519 )
Multiple vulnerabilities exist in the TP-Link Archer NX200, NX210, NX500, and NX600 routers due to improper input handling in the wireless-control modem-management administrative CLI command.
Successful exploitation of these vulnerabilities could allow an authenticated attacker with administrative privileges to execute arbitrary commands on the underlying operating system of the targeted device.
3. Privilege Escalation Vulnerability ( CVE-2025-15605 )
A hardcoded cryptographic key within the configuration mechanism of the TP-Link Archer NX200, NX210, NX500, and NX600 routers allows for the de-cryption and re-encryption of device configuration data. An authenticated at-tacker with administrative privileges could exploit this vulnerability to decrypt configuration files, modify them, and re-encrypt them, thereby compromising the confidentiality and integrity of the device¿s configuration.
Successful exploitation of this vulnerability could allow an attacker to tamper with configuration data on the targeted system.
Solution
Apply appropriate updates as mentioned in:
https://www.tp-link.com/us/support/faq/5027/
Vendor Information
TP-Link
https://www.tp-link.com/us/support/faq/5027/
References
https://www.tp-link.com/us/support/faq/5027/
CVE Name
CVE-2025-15517
CVE-2025-15518
CVE-2025-15519
CVE-2025-15605
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=LHFI
—–END PGP SIGNATURE—–


