VulnerabilitiesHIGH

TP-Link Archer NX Routers - Critical Firmware Vulnerability Alert

SASecurity Affairs
CVE-2025-15517TP-LinkArcher NXauthentication bypassfirmware vulnerability
🎯

Basically, a flaw in TP-Link routers lets hackers take control if not fixed.

Quick Summary

TP-Link has patched a critical vulnerability in Archer NX routers that could allow attackers to take control. Users must update their firmware to protect their devices. This flaw poses significant risks, especially if left unaddressed.

The Flaw

TP-Link has recently issued a patch for a high severity vulnerability (CVE-2025-15517) affecting its Archer NX router series. This flaw allows attackers to bypass authentication, enabling them to upload malicious firmware. The vulnerability has a CVSS score of 8.6, indicating its critical nature. It affects several models, including the NX200, NX210, NX500, and NX600. Essentially, the flaw stems from a missing authentication check in the HTTP server, which allows unauthorized access to certain endpoints meant for authenticated users.

What's at Risk

If exploited, this vulnerability could lead to a complete takeover of the router, allowing attackers to manipulate network traffic and compromise connected devices. The risk is particularly high for users who have not yet updated their firmware. Additionally, another vulnerability (CVE-2025-15605) was patched, which involved a hardcoded cryptographic key that allowed attackers to decrypt and modify configuration files. This further compromises the integrity and confidentiality of the device’s settings.

Patch Status

TP-Link has released security updates for all affected models. Users are urged to download and install the latest firmware versions as soon as possible. The impacted versions include:

  • Archer NX600: v3.0 < 1.3.0 Build 260309
  • Archer NX500: v2.0 < 1.5.0 Build 260309
  • Archer NX210: v3.0 < 1.3.0 Build 260309
  • Archer NX200: v3.0 < 1.3.0 Build 260309

These updates are crucial for maintaining the security of the devices and protecting the network from potential threats.

Immediate Actions

Users of TP-Link Archer NX routers should take the following steps:

  1. Check your router model and firmware version against the list of affected products.
  2. Download the latest firmware from the official TP-Link website.
  3. Install the update to ensure your device is protected against these vulnerabilities.

By taking these actions, users can significantly reduce the risk of unauthorized access and maintain the security of their home networks.

🔒 Pro insight: The authentication bypass in CVE-2025-15517 highlights the need for robust security practices in IoT devices, particularly with firmware updates.

Original article from

Security Affairs · Pierluigi Paganini

Read Full Article

Related Pings

HIGHVulnerabilities

Vulnerabilities - Citrix NetScaler ADC and Gateway Alert

Citrix has revealed two critical vulnerabilities in its NetScaler ADC and Gateway products. UK organizations using these systems must act quickly to apply necessary updates. Failure to do so could result in serious data breaches and unauthorized access risks.

NCSC UK·
HIGHVulnerabilities

GitLab Vulnerabilities - Security Advisory Released

GitLab has issued a security advisory due to vulnerabilities in its software. Users of GitLab Community and Enterprise Editions must update to the latest versions to stay secure. Ignoring these updates could lead to serious security risks.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Node.js Vulnerabilities - Critical Updates Released

Node.js has released critical security updates for multiple versions due to vulnerabilities. Users must upgrade to the latest versions to protect their applications. This is vital to prevent potential attacks and data breaches.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

n8n Vulnerabilities - Security Updates Released for Users

n8n has released crucial security updates for multiple products due to vulnerabilities. Users and administrators must act quickly to apply these updates and protect their data. Ignoring these updates could lead to serious security risks.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Node.js Vulnerabilities - Critical Patches Released

Node.js has released critical patches for multiple vulnerabilities, including risks of DoS attacks and process crashes. Users must upgrade to secure their systems immediately. These updates are vital for maintaining server stability and security.

Cyber Security News·
HIGHVulnerabilities

Citrix Vulnerabilities - Urgent Patch Required for NetScaler

Citrix has identified critical vulnerabilities in its NetScaler products. With thousands of instances exposed, immediate patching is essential to prevent data theft. Stay secure by updating your systems now.

BleepingComputer·