← Back to CVEs
CVE-2025-15518
HIGH7.2
Description
Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.
CVE Details
CVSS v3.1 Score7.2
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredHIGH
User InteractionNONE
Published3/23/2026
Last Modified3/31/2026
Sourcenvd
Honeypot Sightings0
Affected Products
tp-link:archer_nx200tp-link:archer_nx200_firmwaretp-link:archer_nx210tp-link:archer_nx210_firmwaretp-link:archer_nx500tp-link:archer_nx500_firmwaretp-link:archer_nx600tp-link:archer_nx600_firmware
Weaknesses (CWE)
CWE-78
References
https://www.tp-link.com/en/support/download/archer-nx200/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/en/support/download/archer-nx210/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/en/support/download/archer-nx500/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/en/support/download/archer-nx600/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/faq/5027/(f23511db-6c3e-4e32-a477-6aa17d310630)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.