← Zuruck zu CVEs
CVE-2025-14756
HIGH8.8
Beschreibung
Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise.
CVE Details
CVSS v3.1 Bewertung8.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht1/26/2026
Zuletzt geandert3/9/2026
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
tp-link:archer_mr600tp-link:archer_mr600_firmware
Schwachen (CWE)
CWE-77
Referenzen
https://jvn.jp/en/vu/JVNVU94651499/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://jvn.jp/vu/JVNVU94651499/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/en/support/download/archer-mr600/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/jp/support/download/archer-mr600/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/faq/4916/(f23511db-6c3e-4e32-a477-6aa17d310630)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.