Description

TP-Link has released a critical security advisory addressing four high-severity vulnerabilities affecting its Archer series routers, including NX200, NX210, NX500, and NX600 models. These flaws expose devices to significant risks, including unauthorized access, command execution, and manipulation of sensitive configurations; impacting core security mechanisms, potentially allowing attackers to compromise confidentiality, integrity, and availability of affected systems. As these routers are commonly used in enterprise and home networks, exploitation could lead to broader network compromise and unauthorized control over connected environments. CVE-2025-15517, is an authorization bypass vulnerability in HTTP server endpoints, allowing unauthenticated attackers to perform privileged operations like firmware uploads and configuration changes. CVE-2026-15518 and CVE-2026-15519 are command injection flaws within wireless control and modem management CLI interfaces. These vulnerabilities enable authenticated attackers with administrative privileges to inject malicious input and execute arbitrary operating system commands. Successful exploitation could result in full device takeover, unauthorized modifications, and disruption of network operations, significantly impacting device security. CVE-2025-15605 flaw involves a hardcoded cryptographic key within the router’s configuration mechanism, which allows attackers with access to encrypted configuration files to decrypt, modify, and re-encrypt them without detection. Such manipulation can alter network settings, weaken security controls, and maintain persistent unauthorized access. Collectively, these vulnerabilities create a high-risk scenario where attackers can bypass authentication, execute commands, and tamper with sensitive configurations, ultimately leading to complete compromise of affected routers and connected networks. To mitigate these risks, users and administrators must immediately verify their router models and firmware versions, applying the latest updates provided by TP-Link. Firmware should only be downloaded from official sources to ensure integrity. Organizations must enforce strong administrative access controls, restrict remote management interfaces, monitor network activity for anomalies. Prompt patching, combined with secure configuration practices and continuous monitoring, is essential to prevent exploitation and protect network infrastructure from potential compromise.