← Retour aux CVEs
CVE-2025-14756
HIGH8.8
Description
Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise.
Details CVE
Score CVSS v3.18.8
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie1/26/2026
Derniere modification3/9/2026
Sourcenvd
Observations honeypot0
Produits affectes
tp-link:archer_mr600tp-link:archer_mr600_firmware
Faiblesses (CWE)
CWE-77
References
https://jvn.jp/en/vu/JVNVU94651499/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://jvn.jp/vu/JVNVU94651499/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/en/support/download/archer-mr600/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/jp/support/download/archer-mr600/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/faq/4916/(f23511db-6c3e-4e32-a477-6aa17d310630)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.