TP-Link has released a critical security advisory addressing four high-severity vulnerabilities affecting its Archer series routers, including NX200, NX210, NX500, and NX600 models. These flaws expose devices to significant risks, including unauthorized access, command execution, and manipulation of sensitive configurations; impacting core security mechanisms, potentially allowing attackers to compromise confidentiality, integrity, and availability of affected systems. As these routers are commonly used in enterprise and home networks, exploitation could lead to broader network compromise and unauthorized control over connected environments. CVE-2025-15517, is an authorization bypass vulnerability in HTTP server endpoints, allowing unauthenticated attackers to perform privileged operations like firmware uploads and configuration changes. CVE-2026-15518 and CVE-2026-15519 are command injection flaws within wireless control and modem management CLI interfaces. These vulnerabilities enable authenticated attackers with administrative privileges to inject malicious input and execute arbitrary operating system commands. Successful exploitation could result in full device takeover, unauthorized modifications, and disruption of network operations, significantly impacting device security. CVE-2025-15605 flaw involves a hardcoded cryptographic key within the router’s configuration mechanism, which allows attackers with access to encrypted configuration files to decrypt, modify, and re-encrypt them without detection. Such manipulation can alter network settings, weaken security controls, and maintain persistent unauthorized access. Collectively, these vulnerabilities create a high-risk scenario where attackers can bypass authentication, execute commands, and tamper with sensitive configurations, ultimately leading to complete compromise of affected routers and connected networks. To mitigate these risks, users and administrators must immediately verify their router models and firmware versions, applying the latest updates provided by TP-Link. Firmware should only be downloaded from official sources to ensure integrity. Organizations must enforce strong administrative access controls, restrict remote management interfaces, monitor network activity for anomalies. Prompt patching, combined with secure configuration practices and continuous monitoring, is essential to prevent exploitation and protect network infrastructure from potential compromise.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...