CVE-2025-15551
EUVD-2025-20682605.02.2026, 18:16
The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| tp-link | archer_mr200_firmware | 𝑥 < 250917 |
| tp-link | archer_c20_firmware | 𝑥 < 250630 |
| tp-link | tl-wr850n_firmware | 𝑥 < 0.9.1_Build251205 |
| tp-link | tl-wr845n_firmware | 𝑥 < 251031 |
𝑥
= Vulnerable software versions
References