TP-Link Patches High-Severity Router Vulnerabilities
Briefly

TP-Link Patches High-Severity Router Vulnerabilities
"CVE-2025-15517 allows attackers to bypass authentication and perform actions such as firmware uploads or configuration operations, according to TP-Link's advisory."
"CVE-2026-15518 and CVE-2026-15519 are command injection bugs that require administrative privileges for successful exploitation, while CVE-2025-15605 involves a hardcoded cryptographic key for configuration file encryption."
"Successful exploitation of these security defects could allow attackers to execute arbitrary code remotely on vulnerable devices or to leak credentials via a man-in-the-middle (MITM) attack."
TP-Link addressed four critical vulnerabilities in its Archer NX router models, including CVE-2025-15517, which allows authentication bypass. Other vulnerabilities involve command injection requiring admin privileges and a hardcoded cryptographic key issue. These flaws could enable remote code execution or credential leaks. The patches were released shortly before Cisco's Talos disclosed additional vulnerabilities in TP-Link's Archer AX53 routers. Talos reported these issues to TP-Link in October, leading to fixes in February for the AX53 model.
Read at SecurityWeek
Unable to calculate read time
[
|
]