HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🔴 Critical🛡️ Vulnerability

Critical Auth Bypass (CVE‑2025‑15517) Allows Unauthenticated Firmware Upload on TP‑Link Archer NX Routers

TP‑Link disclosed a critical authentication‑bypass flaw (CVE‑2025‑15517) affecting Archer NX200/210/500/600 routers that permits unauthenticated firmware uploads. The vulnerability is being exploited in the wild, making immediate patching essential for any organization that relies on TP‑Link networking equipment.

🛡️ LiveThreat™ Intelligence · 📅 March 25, 2026· 📰 bleepingcomputer.com
🔴
Severity
Critical
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
bleepingcomputer.com

Critical Auth Bypass (CVE‑2025‑15517) Allows Unauthenticated Firmware Upload on TP‑Link Archer NX Routers

What Happened – TP‑Link released firmware updates for its Archer NX200/210/500/600 series that fix a critical authentication‑bypass flaw (CVE‑2025‑15517) which lets unauthenticated attackers upload arbitrary firmware and change device configuration. The update also removes a hard‑coded cryptographic key (CVE‑2025‑15605) and patches two command‑injection bugs (CVE‑2025‑15518/15519).

Why It Matters for TPRM

  • Unpatched routers can become footholds for lateral movement into corporate networks.
  • Firmware compromise defeats endpoint security controls and can expose downstream SaaS and cloud services.
  • The flaw is actively exploited in the wild, raising immediate supply‑chain risk for any organization that relies on TP‑Link networking gear.

Who Is Affected – Enterprises, MSPs, and any third‑party that deploys TP‑Link Archer NX routers across sectors such as finance, healthcare, education, and manufacturing.

Recommended Actions

  • Verify that all Archer NX devices have installed the latest TP‑Link firmware (version 1.2.3‑release or later).
  • Conduct an inventory of all TP‑Link routers in your environment and enforce a patch‑management schedule.
  • Review network segmentation to limit router management interfaces to trusted admin subnets.
  • Monitor for anomalous HTTP requests to /cgi-bin/ endpoints and unexpected firmware‑upload traffic.

Technical Notes – The vulnerability stems from a missing authentication check in the router’s embedded HTTP server, enabling unauthenticated HTTP POSTs to privileged CGI endpoints. Exploitation permits firmware upload, configuration changes, and, via related CVEs, decryption of configuration files and arbitrary command execution. A hard‑coded AES key (CVE‑2025‑15605) was also removed. Source: BleepingComputer

📰 Original Source
https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.