Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1571: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in TP-Link Systems Inc. Archer C60 v3

0
Medium
VulnerabilityCVE-2026-1571cvecve-2026-1571cwe-79
Published: Wed Feb 11 2026 (02/11/2026, 00:39:29 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer C60 v3

Description

User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/10/2026, 18:58:36 UTC

Technical Analysis

CVE-2026-1571 is a cross-site scripting (XSS) vulnerability classified under CWE-79, found in the TP-Link Archer C60 version 3 router. The vulnerability stems from improper neutralization of user-controlled input during web page generation in the device’s web management interface. Specifically, the router’s web UI reflects input from crafted URLs directly into HTML output without adequate encoding or sanitization, enabling an attacker to inject and execute arbitrary JavaScript code. This flaw can be exploited remotely over the network without requiring authentication, though it does require user interaction such as clicking a maliciously crafted URL. Successful exploitation allows an attacker to run scripts in the security context of the router’s web interface, which could lead to theft of administrative credentials, session hijacking, or execution of unintended administrative actions. The CVSS 4.0 base score is 5.3 (medium severity), reflecting the network attack vector, low attack complexity, no privileges required, but requiring user interaction and resulting in limited confidentiality and integrity impacts. No patches or fixes have been published yet, and no known exploits have been observed in the wild. The vulnerability affects all devices running the vulnerable firmware version of the Archer C60 v3, a popular home and small office router model by TP-Link. Given the device’s role as a network gateway, exploitation could compromise network security and privacy for affected users.

Potential Impact

The impact of CVE-2026-1571 is significant for organizations and individuals using the TP-Link Archer C60 v3 router, particularly where the device’s web management interface is accessible from untrusted networks or exposed to the internet. Successful exploitation can lead to credential theft, allowing attackers to gain administrative access to the router. This could result in unauthorized changes to network configurations, interception or redirection of network traffic, and potential pivoting to internal network resources. Session hijacking could disrupt legitimate administrative sessions, causing denial of service or enabling further malicious actions. While the vulnerability does not directly affect device availability or cause system crashes, the compromise of router management credentials can have cascading effects on network security and confidentiality. Organizations relying on these routers in home office or small business environments may face increased risk of network compromise, data leakage, and persistent attacker presence. The lack of a patch and the requirement for user interaction somewhat limit the scope, but targeted phishing or social engineering campaigns could facilitate exploitation. Overall, the vulnerability poses a moderate threat to network integrity and confidentiality.

Mitigation Recommendations

To mitigate CVE-2026-1571, organizations and users should take the following specific actions: 1) Restrict access to the router’s web management interface by limiting it to trusted internal networks only, disabling remote management features if not required. 2) Implement network segmentation to isolate the router management interface from general user networks and untrusted devices. 3) Use strong, unique administrative passwords to reduce the risk of credential compromise if session hijacking occurs. 4) Educate users about the risks of clicking unsolicited or suspicious URLs that could trigger XSS attacks on the router interface. 5) Monitor network and router logs for unusual access patterns or repeated failed login attempts that may indicate exploitation attempts. 6) Regularly check for firmware updates or security advisories from TP-Link and apply patches promptly once available. 7) Consider deploying web application firewalls or intrusion detection systems capable of detecting and blocking XSS payloads targeting the router’s management interface. 8) If feasible, restrict browser access to the router UI to hardened or dedicated management workstations to reduce exposure. These measures collectively reduce the attack surface and limit the potential for successful exploitation until an official patch is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-28T21:16:37.609Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698bd4e04b57a58fa13e5766

Added to database: 2/11/2026, 1:01:20 AM

Last enriched: 3/10/2026, 6:58:36 PM

Last updated: 4/6/2026, 4:54:08 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses