Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15519: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer NX600 v3.0

0
High
VulnerabilityCVE-2025-15519cvecve-2025-15519cwe-78
Published: Mon Mar 23 2026 (03/23/2026, 18:01:50 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer NX600 v3.0

Description

CVE-2025-15519 is a high-severity OS command injection vulnerability affecting TP-Link Archer NX600 v3. 0 and related models. It arises from improper input validation in an administrative CLI command used for modem management. An authenticated attacker with administrative privileges can inject and execute arbitrary OS commands, compromising device confidentiality, integrity, and availability. Exploitation requires no user interaction but does require high-level privileges. This vulnerability impacts multiple TP-Link Archer models, including NX200, NX210, NX500, and NX600. No known public exploits exist yet, but the CVSS 4. 0 score of 8. 5 reflects significant risk. Organizations relying on these devices for network connectivity face potential device takeover and network disruption.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/30/2026, 20:46:26 UTC

Technical Analysis

CVE-2025-15519 is an OS command injection vulnerability classified under CWE-78 that affects TP-Link Systems Inc.'s Archer NX600 v3.0 and related models (NX200, NX210, NX500). The root cause is improper neutralization of special elements in input passed to an operating system command within a modem-management administrative CLI interface. This flaw allows an attacker who has authenticated administrative access to craft malicious input that is executed directly by the underlying OS shell. As a result, the attacker can execute arbitrary commands with the privileges of the administrative user, potentially leading to full device compromise. The vulnerability does not require user interaction but does require high privileges, making it a critical risk in environments where administrative credentials are exposed or weakly protected. The CVSS 4.0 vector (AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) indicates the attack is network-based but requires high privileges, with high impact on confidentiality, integrity, and availability. No patches or public exploits are currently known, but the vulnerability is published and should be addressed promptly. The affected devices are commonly used in home and small business networks, making this a significant threat to network infrastructure stability and security.

Potential Impact

The impact of CVE-2025-15519 is substantial for organizations using affected TP-Link Archer devices. Successful exploitation allows attackers to execute arbitrary OS commands with administrative privileges, enabling them to alter device configurations, install persistent malware, intercept or redirect network traffic, or cause denial of service by disrupting device operations. This compromises the confidentiality, integrity, and availability of the device and potentially the entire network it supports. In enterprise or critical infrastructure environments, this could lead to broader network infiltration, data breaches, or operational outages. Since the vulnerability requires administrative access, the risk is elevated in scenarios where credential management is poor or where attackers have already gained partial access. The lack of user interaction needed for exploitation increases the threat level in automated attack scenarios or insider threat cases.

Mitigation Recommendations

To mitigate CVE-2025-15519, organizations should immediately restrict administrative access to affected TP-Link devices by enforcing strong authentication mechanisms, such as multi-factor authentication and complex passwords. Network segmentation should be employed to limit access to device management interfaces only to trusted administrators. Monitoring and logging of administrative CLI commands can help detect suspicious activity. Since no official patches are currently available, organizations should contact TP-Link support for updates or advisories and apply firmware updates as soon as they are released. Additionally, consider replacing vulnerable devices with models that have confirmed secure firmware if patching is delayed. Employing network-level protections such as firewalls and intrusion detection systems to monitor and block anomalous traffic targeting device management interfaces can further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-13T19:45:17.342Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c1835bf4197a8e3b7ecb9e

Added to database: 3/23/2026, 6:15:55 PM

Last enriched: 3/30/2026, 8:46:26 PM

Last updated: 5/7/2026, 3:20:02 AM

Views: 74

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses