HomeTp-LinkCVE-2025-15517

CVE-2025-15517

HIGH
8.6CVSS
Published: 2026-03-23
Updated: 2026-03-31
AI Analysis

Description

A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations.

CVSS Metrics

Vector
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Attack Vector
adjacent
Complexity
low
Privileges
none
User Action
none
Confidentiality
undefined
Integrity
undefined
Availability
undefined
Weaknesses
CWE-306

Metadata

Primary Vendor
TP-LINK
Published
3/23/2026
Last Modified
3/31/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

tp-link : archer_nx600_firmwaretp-link : archer_nx500_firmwaretp-link : archer_nx210_firmwaretp-link : archer_nx200_firmwaretp-link : archer_nx600_firmwaretp-link : archer_nx600_firmwaretp-link : archer_nx500_firmwaretp-link : archer_nx210_firmwaretp-link : archer_nx200_firmwaretp-link : archer_nx200_firmware

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-15517 | HIGH Severity | CVEDatabase.com | CVEDatabase.com