Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15517: CWE-306 Missing Authentication for Critical Function in TP-Link Systems Inc. Archer NX600 v3.0

0
High
VulnerabilityCVE-2025-15517cvecve-2025-15517cwe-306
Published: Mon Mar 23 2026 (03/23/2026, 18:01:31 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer NX600 v3.0

Description

CVE-2025-15517 is a high-severity vulnerability affecting TP-Link Archer NX600 v3. 0 and related models, caused by missing authentication checks on certain HTTP CGI endpoints. This flaw allows unauthenticated attackers to perform privileged actions such as firmware uploads and configuration changes without requiring any credentials or user interaction. The vulnerability impacts multiple models including NX200, NX210, NX500, and NX600, exposing critical router management functions to remote exploitation. The CVSS 4. 0 score of 8. 6 reflects the high impact on confidentiality and integrity with no authentication or user interaction needed, though the attack vector is adjacent network. No known exploits are currently reported in the wild. Organizations using these TP-Link devices risk unauthorized control over network infrastructure, potentially leading to persistent compromise, network disruption, or interception of sensitive data. Mitigation requires immediate firmware updates from the vendor once available, network segmentation to limit access to router management interfaces, and monitoring for suspicious HTTP requests targeting vulnerable endpoints.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:45:49 UTC

Technical Analysis

CVE-2025-15517 is a vulnerability identified in TP-Link Systems Inc.'s Archer NX600 v3.0 and related models (NX200, NX210, NX500, NX600) caused by a missing authentication check on certain HTTP CGI endpoints within the device's embedded HTTP server. These endpoints are intended to be accessible only to authenticated users for performing critical management functions such as firmware uploads and configuration changes. Due to the lack of authentication enforcement (CWE-306), an attacker connected to the adjacent network (e.g., local network or Wi-Fi) can send crafted HTTP requests to these CGI endpoints and execute privileged operations without any credentials or user interaction. This flaw effectively bypasses access controls, allowing unauthorized firmware installation or configuration manipulation, which can lead to persistent device compromise, network traffic interception, or denial of service. The vulnerability has a CVSS 4.0 base score of 8.6, reflecting high impact on confidentiality and integrity, with an attack vector classified as adjacent network, no privileges required, and no user interaction needed. Although no known exploits are currently reported in the wild, the vulnerability's nature makes it a significant risk for affected users. The affected devices are commonly used consumer and small business routers, widely deployed globally. The vulnerability was reserved in January 2026 and published in March 2026, with no patch links currently available, indicating that mitigation relies on vendor updates and network-level controls until fixes are released.

Potential Impact

The impact of CVE-2025-15517 is substantial for organizations and individuals using affected TP-Link routers. Unauthorized access to critical router functions can lead to complete device takeover, allowing attackers to upload malicious firmware, alter configurations, or disable security features. This can result in persistent network compromise, interception or redirection of network traffic, and potential lateral movement within internal networks. For enterprises, this could mean exposure of sensitive corporate data, disruption of business operations, and erosion of trust in network infrastructure. Small businesses and home users face risks of privacy breaches, internet service disruption, and use of compromised devices in botnets or other malicious activities. The ease of exploitation without authentication or user interaction increases the likelihood of attacks, especially in environments where network access is not tightly controlled. Given the critical role of routers as network gateways, exploitation can have cascading effects on the confidentiality, integrity, and availability of connected systems and data.

Mitigation Recommendations

1. Apply firmware updates from TP-Link as soon as they become available to address the authentication bypass vulnerability. 2. Until patches are released, restrict access to router management interfaces by implementing network segmentation and firewall rules that limit HTTP access to trusted administrative hosts only. 3. Disable remote management features if not required, especially those accessible over Wi-Fi or untrusted networks. 4. Monitor network traffic for unusual HTTP requests targeting router CGI endpoints indicative of exploitation attempts. 5. Use strong Wi-Fi encryption and authentication to prevent unauthorized network access. 6. Regularly audit router configurations and logs for unauthorized changes. 7. Consider deploying network intrusion detection/prevention systems (IDS/IPS) that can detect anomalous management traffic patterns. 8. Educate users and administrators about the risks of unauthorized router access and encourage prompt reporting of suspicious behavior. 9. Maintain an inventory of affected devices to prioritize remediation efforts. 10. Engage with TP-Link support channels to obtain official patches and guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-13T19:43:48.978Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1835bf4197a8e3b7ecb90

Added to database: 3/23/2026, 6:15:55 PM

Last enriched: 3/30/2026, 8:45:49 PM

Last updated: 5/7/2026, 3:19:55 AM

Views: 381

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses