Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15517: CWE-306 Missing Authentication for Critical Function in TP-Link Systems Inc. Archer NX600 v3.0

0
High
VulnerabilityCVE-2025-15517cvecve-2025-15517cwe-306
Published: Mon Mar 23 2026 (03/23/2026, 18:01:31 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer NX600 v3.0

Description

CVE-2025-15517 is a high-severity vulnerability affecting TP-Link Archer NX200, NX210, NX500, and NX600 routers, specifically version 3. 0 of the NX600. The flaw is due to missing authentication checks on certain HTTP CGI endpoints, allowing unauthenticated attackers to perform privileged actions such as firmware uploads and configuration changes. Exploitation requires no user interaction or prior authentication, and the attack vector is adjacent network access. Although no known exploits are currently in the wild, the vulnerability poses a significant risk of device compromise and network infiltration. The CVSS 4. 0 base score is 8. 6, reflecting high impact on confidentiality and integrity. Organizations using these devices should prioritize patching or apply mitigations to restrict access to the management interface. Countries with large deployments of TP-Link routers and critical infrastructure relying on these devices are at heightened risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/23/2026, 18:31:45 UTC

Technical Analysis

CVE-2025-15517 is a critical vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting TP-Link Systems Inc.'s Archer NX series routers, including NX200, NX210, NX500, and NX600 v3.0. The vulnerability stems from the HTTP server component failing to enforce authentication checks on specific CGI endpoints intended only for authenticated users. This flaw allows an unauthenticated attacker with network access to these devices to invoke privileged HTTP actions, such as uploading malicious firmware or altering device configurations, without any credentials. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or connected via VPN but does not require user interaction or prior privileges. The vulnerability severely compromises device confidentiality and integrity, potentially enabling persistent device takeover, network traffic interception, or lateral movement within the network. Despite no known exploits in the wild as of now, the ease of exploitation and high impact make this a critical concern for affected users. The lack of authentication on critical functions is a fundamental security oversight, and the absence of patches at the time of disclosure necessitates immediate mitigation efforts. The CVSS 4.0 score of 8.6 reflects the high severity, with low attack complexity and no privileges or user interaction required.

Potential Impact

The impact of CVE-2025-15517 is substantial for organizations using affected TP-Link Archer routers. Successful exploitation can lead to complete device compromise, allowing attackers to upload malicious firmware, change network configurations, or disable security features. This can result in loss of confidentiality through interception or redirection of network traffic, integrity breaches by altering device behavior, and potential availability issues if the device is rendered inoperable. Compromised routers can serve as footholds for further network intrusion, data exfiltration, or launching attacks against internal systems. Enterprises, ISPs, and home users relying on these devices face risks of unauthorized access and persistent threats. The vulnerability's presence in widely deployed consumer and small business routers increases the attack surface globally. Without authentication, even low-skilled attackers on the same network segment can exploit this flaw, making it a critical risk in environments with shared or poorly segmented networks.

Mitigation Recommendations

1. Immediately restrict access to the router's management interfaces by limiting network exposure, such as disabling remote management and ensuring management interfaces are accessible only from trusted internal networks. 2. Implement network segmentation to isolate router management traffic from general user traffic, reducing the risk of adjacent network exploitation. 3. Monitor network traffic for unusual HTTP requests targeting CGI endpoints on affected devices to detect potential exploitation attempts. 4. Apply any vendor-provided firmware updates or patches as soon as they become available; if no patches exist, consider replacing affected devices with models not vulnerable to this issue. 5. Use strong network access controls and authentication mechanisms at the network perimeter to prevent unauthorized local network access. 6. Employ intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting these specific CGI endpoints. 7. Educate users and administrators about the risks of using default or outdated router firmware and the importance of timely updates and secure configurations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-13T19:43:48.978Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1835bf4197a8e3b7ecb90

Added to database: 3/23/2026, 6:15:55 PM

Last enriched: 3/23/2026, 6:31:45 PM

Last updated: 3/23/2026, 7:19:17 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses