CVE-2025-15035: CWE-20 Improper Input Validation in TP-Link Systems Inc. Archer AXE75 v1.6
Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn modules) allows an authenticated adjacent attacker to delete arbitrary server file, leading to possible loss of critical system files and service interruption or degraded functionality.This issue affects Archer AXE75 v1.6: ≤ build 20250107.
AI Analysis
Technical Summary
CVE-2025-15035 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting the VPN modules of the TP-Link Archer AXE75 v1.6 router firmware versions up to build 20250107. The flaw allows an authenticated attacker with adjacent network access—meaning the attacker must be on the same local or logically adjacent network segment—to craft malicious input that leads to arbitrary deletion of server files on the device. This improper validation of input parameters fails to restrict file deletion operations to authorized or safe paths, enabling the attacker to remove critical system files. The consequence of this vulnerability includes potential loss of essential system files, which can cause service interruptions, degraded router functionality, or even device instability. The CVSS 4.0 vector indicates the attack requires low complexity, no user interaction, and privileges (high) but no authentication bypass, with a medium overall severity score of 6.9. No public exploits have been reported yet, but the vulnerability poses a risk to network availability and integrity, especially in environments relying on these routers for VPN connectivity. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for cautious network segmentation and monitoring.
Potential Impact
For European organizations, this vulnerability could disrupt VPN services critical for secure remote access and inter-office communications, potentially leading to downtime and loss of productivity. The deletion of critical system files may also require device reconfiguration or replacement, incurring operational costs. Organizations relying on these routers in sensitive environments may face increased risk of network instability or exposure if attackers leverage this flaw to degrade security controls. Given the requirement for authenticated adjacent access, the threat is more pronounced in environments with less network segmentation or where attackers can gain local network presence, such as large enterprises, universities, or public Wi-Fi networks. The impact on confidentiality is limited, but integrity and availability of network services are at risk. This could indirectly affect compliance with European data protection regulations if network outages impede security monitoring or data access controls.
Mitigation Recommendations
European organizations should immediately inventory their network infrastructure to identify any TP-Link Archer AXE75 v1.6 devices running vulnerable firmware versions (≤ build 20250107). Until an official patch is released, organizations should implement strict network segmentation to limit access to the management and VPN interfaces of these routers, ensuring only trusted and authenticated devices can communicate on adjacent networks. Enforce strong authentication and access controls on router management interfaces to prevent unauthorized access. Monitor network logs and device behavior for unusual file deletion activities or service disruptions. Consider disabling VPN modules if not in use or replacing vulnerable devices with updated hardware or firmware versions once available. Engage with TP-Link support channels for updates on patches or workarounds. Additionally, implement intrusion detection systems capable of identifying anomalous commands or file operations on network devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-15035: CWE-20 Improper Input Validation in TP-Link Systems Inc. Archer AXE75 v1.6
Description
Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn modules) allows an authenticated adjacent attacker to delete arbitrary server file, leading to possible loss of critical system files and service interruption or degraded functionality.This issue affects Archer AXE75 v1.6: ≤ build 20250107.
AI-Powered Analysis
Technical Analysis
CVE-2025-15035 is a vulnerability classified under CWE-20 (Improper Input Validation) affecting the VPN modules of the TP-Link Archer AXE75 v1.6 router firmware versions up to build 20250107. The flaw allows an authenticated attacker with adjacent network access—meaning the attacker must be on the same local or logically adjacent network segment—to craft malicious input that leads to arbitrary deletion of server files on the device. This improper validation of input parameters fails to restrict file deletion operations to authorized or safe paths, enabling the attacker to remove critical system files. The consequence of this vulnerability includes potential loss of essential system files, which can cause service interruptions, degraded router functionality, or even device instability. The CVSS 4.0 vector indicates the attack requires low complexity, no user interaction, and privileges (high) but no authentication bypass, with a medium overall severity score of 6.9. No public exploits have been reported yet, but the vulnerability poses a risk to network availability and integrity, especially in environments relying on these routers for VPN connectivity. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for cautious network segmentation and monitoring.
Potential Impact
For European organizations, this vulnerability could disrupt VPN services critical for secure remote access and inter-office communications, potentially leading to downtime and loss of productivity. The deletion of critical system files may also require device reconfiguration or replacement, incurring operational costs. Organizations relying on these routers in sensitive environments may face increased risk of network instability or exposure if attackers leverage this flaw to degrade security controls. Given the requirement for authenticated adjacent access, the threat is more pronounced in environments with less network segmentation or where attackers can gain local network presence, such as large enterprises, universities, or public Wi-Fi networks. The impact on confidentiality is limited, but integrity and availability of network services are at risk. This could indirectly affect compliance with European data protection regulations if network outages impede security monitoring or data access controls.
Mitigation Recommendations
European organizations should immediately inventory their network infrastructure to identify any TP-Link Archer AXE75 v1.6 devices running vulnerable firmware versions (≤ build 20250107). Until an official patch is released, organizations should implement strict network segmentation to limit access to the management and VPN interfaces of these routers, ensuring only trusted and authenticated devices can communicate on adjacent networks. Enforce strong authentication and access controls on router management interfaces to prevent unauthorized access. Monitor network logs and device behavior for unusual file deletion activities or service disruptions. Consider disabling VPN modules if not in use or replacing vulnerable devices with updated hardware or firmware versions once available. Engage with TP-Link support channels for updates on patches or workarounds. Additionally, implement intrusion detection systems capable of identifying anomalous commands or file operations on network devices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- TPLink
- Date Reserved
- 2025-12-22T21:12:18.518Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69613a016c9099d823001a99
Added to database: 1/9/2026, 5:25:21 PM
Last enriched: 1/9/2026, 5:39:56 PM
Last updated: 1/10/2026, 4:00:06 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65091: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in xwiki-contrib macro-fullcalendar
CriticalCVE-2025-65090: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in xwiki-contrib macro-fullcalendar
MediumCVE-2025-61676: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in octobercms october
MediumCVE-2025-61674: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in octobercms october
MediumCVE-2025-13457: CWE-639 Authorization Bypass Through User-Controlled Key in woocommerce WooCommerce Square
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.