PT-2026-27163 · Tp Link Systems · Archer Nx200 V1.0+10
Saifeldeen Aziz
·
Published
2026-03-23
·
Updated
2026-03-23
·
CVE-2025-15518
CVSS v4.0
8.5
High
| AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.
Fix
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Archer Nx200 V1.0
Archer Nx200 V2.0
Archer Nx200 V2.20
Archer Nx200 V3.0
Archer Nx210 V2.0 V2.20
Archer Nx210 V3.0
Archer Nx500 V1.0
Archer Nx500 V2.0
Archer Nx600 V1.0
Archer Nx600 V2.0
Archer Nx600 V3.0