CVE-2025-15518

EUVD-2025-208939
Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.2 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 26%
Affected Products (NVD)
VendorProductVersion
tp-linkarcher_nx600_firmware
𝑥
< 1.3.0
tp-linkarcher_nx500_firmware
𝑥
< 1.5.0
tp-linkarcher_nx210_firmware
𝑥
< 1.3.0
tp-linkarcher_nx200_firmware
𝑥
< 1.3.0
tp-linkarcher_nx600_firmware
𝑥
< 1.3.0
tp-linkarcher_nx600_firmware
𝑥
< 1.4.0
tp-linkarcher_nx500_firmware
𝑥
< 1.3.0
tp-linkarcher_nx210_firmware
𝑥
< 1.3.0
tp-linkarcher_nx200_firmware
𝑥
< 1.3.0
tp-linkarcher_nx200_firmware
𝑥
< 1.8.0
𝑥
= Vulnerable software versions