Cyber Posture

CVE-2025-15517

High

Published: 23 March 2026

Published
23 March 2026
Modified
31 March 2026
KEV Added
Patch
CVSS Score 8.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0010 27.6th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2025-15517, published on 2026-03-23, is a missing authentication check vulnerability (CWE-306) in the HTTP server of TP-Link Archer NX200, NX210, NX500, and NX600 routers. The flaw affects certain CGI endpoints, enabling unauthenticated access to features intended exclusively for authenticated users. It carries a CVSS v3.1 base score of 8.1 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).

An unauthenticated attacker on an adjacent network can exploit this low-complexity vulnerability without user interaction. Exploitation allows performance of privileged HTTP actions, such as firmware uploads and configuration operations, resulting in high confidentiality and integrity impacts.

TP-Link provides firmware updates for mitigation on dedicated support download pages for the Archer NX200, NX210, NX500, and NX600 models, along with additional guidance in their FAQ at https://www.tp-link.com/us/support/faq/5027/.

Details

CWE(s)
CWE-306

Affected Products

tp-link
archer nx600 firmware
≤ 1.3.0 · ≤ 1.3.0 · ≤ 1.4.0
tp-link
archer nx500 firmware
≤ 1.5.0 · ≤ 1.3.0
tp-link
archer nx210 firmware
≤ 1.3.0 · ≤ 1.3.0
tp-link
archer nx200 firmware
≤ 1.3.0 · ≤ 1.3.0 · ≤ 1.8.0

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Missing authentication in HTTP server CGI endpoints enables unauthenticated attackers to exploit public-facing router web application for privileged actions like firmware uploads and configuration changes.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References