Description
Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.
CVSS Metrics
- Vector
- CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
- Attack Vector
- adjacent
- Complexity
- low
- Privileges
- high
- User Action
- none
- Confidentiality
- undefined
- Integrity
- undefined
- Availability
- undefined
- Weaknesses
- CWE-78
Metadata
- Primary Vendor
- TP-LINK
- Published
- 3/23/2026
- Last Modified
- 3/31/2026
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
tp-link : archer_nx600_firmwaretp-link : archer_nx500_firmwaretp-link : archer_nx210_firmwaretp-link : archer_nx200_firmwaretp-link : archer_nx600_firmwaretp-link : archer_nx600_firmwaretp-link : archer_nx500_firmwaretp-link : archer_nx210_firmwaretp-link : archer_nx200_firmwaretp-link : archer_nx200_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.