[CIVN-2026-0158] Multiple Vulnerabilities in TP-Link router

By Published On: March 25, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in TP-Link router


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Systems Affected


Archer NX200 v1.0 versions below 1.8.0 Build 260311

Archer NX200 v2.0 versions below 1.3.0 Build 260311

Archer NX200 v2.20 versions below 1.3.0 Build 260311

Archer NX200 v3.0 versions below 1.3.0 Build 260309

Archer NX210 v2.0 versions below 1.3.0 Build 260311

Archer NX210 v2.20 versions below 1.3.0 Build 260311

Archer NX210 v3.0 versions below 1.3.0 Build 260309

Archer NX500 v1.0 versions below 1.3.0 Build 260311

Archer NX500 v2.0 versions below 1.5.0 Build 260309

Archer NX600 v1.0 versions below 1.4.0 Build 260311

Archer NX600 v2.0 versions below 1.3.0 Build 260311

Archer NX600 v3.0 versions below 1.3.0 Build 260309

Overview


Multiple vulnerabilities have been reported in TP-Link Archer NX200, NX210, NX500, and NX600 routers which could allow the attacker to perform unauthorized privileged HTTP actions, potentially leading to arbitrary modification or tampering of the device¿s configuration data.


Target Audience:

All organizations and individuals using TP-Link Archer router.


Risk Assessment:

High risks of service interruption and unauthorized access.


Impact Assessment:

Potential impact on confidentiality, integrity and availability of the system.


Description


1. Authorization Bypass Vulnerability ( CVE-2025-15517   )


A vulnerability exists in the TP-Link Archer NX200, NX210, NX500, and NX600 routers due to a missing authentication check in the HTTP server for certain CGI endpoints. This vulnerability could exploit by unauthenticated us-ers to access functionality intended only for authenticated users.

Successful exploitation of this vulnerability could enable an attacker to per-form privileged HTTP actions without authentication, including firmware up-loads and configuration changes.


2. Command Injection Vulnerability ( CVE-2025-15518   CVE-2025-15519   )


Multiple vulnerabilities exist in the TP-Link Archer NX200, NX210, NX500, and NX600 routers due to improper input handling in the wireless-control modem-management administrative CLI command.

Successful exploitation of these vulnerabilities could allow an authenticated attacker with administrative privileges to execute arbitrary commands on the underlying operating system of the targeted device.


3. Privilege Escalation Vulnerability ( CVE-2025-15605   )


A hardcoded cryptographic key within the configuration mechanism of the TP-Link Archer NX200, NX210, NX500, and NX600 routers allows for the de-cryption and re-encryption of device configuration data. An authenticated at-tacker with administrative privileges could exploit this vulnerability to decrypt configuration files, modify them, and re-encrypt them, thereby compromising the confidentiality and integrity of the device¿s configuration.

Successful exploitation of this vulnerability could allow an attacker to tamper with configuration data on the targeted system.


Solution


Apply appropriate updates as mentioned in:

https://www.tp-link.com/us/support/faq/5027/



Vendor Information


TP-Link

https://www.tp-link.com/us/support/faq/5027/


References


 

https://www.tp-link.com/us/support/faq/5027/


CVE Name

CVE-2025-15517

CVE-2025-15518

CVE-2025-15519

CVE-2025-15605




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmnD9ukACgkQ3jCgcSdc

ys/OtQ/8DmyRcG4ACpkymXe99iel2pRjt8UG1j5qvT/b5wUsSqpv56XOdKB/HGGj

cLO0yaXnlGW7sJnw7ykfy+0xFQiAA/Tdr8I7onE9M7UHZudyzgYM+kpcgIIRdm6h

CsEbS/fQOkDkVLD86+BUEcnOQn0ffzb8GkGpHAjxpD/j7FXB00w1aDd0UvN7Xg8L

fA6X/4SbWiE8vyFGDZIOUNS3sXP/8H7D20cFFa4tkObSGTkqILndAZykAhipmUFC

WaOkWeOhHuxltoHz+4K+qGagiEQPXqIgFPLXFeyRDh5JZdfmAmuaCIUraVU0SLgv

+yNYYONjObtMHKb9yJdTJjjST9/r7+WDwAYf4Zl0iwEBuZPjaokWV1fttewHxnPq

zgYYMGqfowMZlSHWwKhrDm9Yk4ccfhbDpn5rl4GTth5x2Oj924Hjt4zGeJonEfKU

UPToz1lxXFxU2MVeOZP3TdaoHnqhODXQLtIklwgAUVg/+jNAtMrPDr2Q50MGjxBy

2mg+yg0IGxsaR/nFZl7osam7ApluUxEI1g9GsnIIozK/ux1bIILYlVJkhcZouvpm

j2hhra+w6ay97AQmsQzzksq2O9e7I36QUEN5jeMnwx5xlKU9E4syxWhh0NVLdMsG

ZubnASGsf+kOmP+DQi1v8b6y/lANCabWndUMJW3wCZKPDybOhkQ=

=LHFI

—–END PGP SIGNATURE—–


Share this article