HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

Critical Authentication Bypass (CVE‑2025‑15517) Enables Firmware Takeover in TP‑Link Archer NX Routers

TP‑Link has patched CVE‑2025‑15517, an authentication‑bypass flaw in Archer NX routers that allows unauthenticated firmware uploads. The issue affects multiple NX models and poses a supply‑chain risk for organizations relying on these devices. Prompt firmware updates and inventory checks are essential for third‑party risk mitigation.

🛡️ LiveThreat™ Intelligence · 📅 March 26, 2026· 📰 securityaffairs.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
securityaffairs.com

Critical Authentication Bypass (CVE‑2025‑15517) Enables Firmware Takeover in TP‑Link Archer NX Routers

What It Is – TP‑Link disclosed a high‑severity authentication‑bypass flaw (CVE‑2025‑15517, CVSS 8.6) in the Archer NX series that lets an unauthenticated attacker upload arbitrary firmware via a vulnerable CGI endpoint. A second issue (CVE‑2025‑15605, CVSS 8.5) removes a hard‑coded cryptographic key, allowing decryption and re‑encryption of configuration data.

Exploitability – The vulnerability is publicly disclosed, patches are available, and proof‑of‑concept exploits have been shared in the advisory. No active ransomware‑style exploit‑as‑a‑service has been observed, but the attack surface is trivial for network‑adjacent threat actors.

Affected Products – TP‑Link Archer NX 200, NX 210, NX 500, and NX 600 routers across multiple firmware generations (see advisory for exact version thresholds).

TPRM Impact – Any organization that outsources networking to a vendor using these routers faces a supply‑chain risk: compromised firmware can be used to pivot into internal systems, exfiltrate data, or launch lateral attacks against downstream customers.

Recommended Actions

  • Immediately deploy TP‑Link’s firmware updates (≥ 1.3.0 Build 260309 for v3.0, ≥ 1.5.0 Build 260309 for v2.0, etc.).
  • Conduct an inventory of Archer NX devices across all third‑party sites and verify firmware signatures.
  • Enforce network segmentation for IoT/consumer‑grade routers and restrict outbound HTTP to vendor update servers only.
  • Monitor logs for unauthenticated HTTP POSTs to /cgi-bin/* endpoints and for unexpected firmware version changes.
  • Review contractual clauses with vendors to require timely patching of network equipment.

Source: Security Affairs – Patch now: TP‑Link Archer NX routers vulnerable to firmware takeover

📰 Original Source
https://securityaffairs.com/189980/iot/patch-now-tp-link-archer-nx-routers-vulnerable-to-firmware-takeover.html

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.