Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.
Metrics
Affected Vendors & Products
References
History
Mon, 23 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device. | |
| Title | Command Injection in Wireless Control CLI on TP-Link Archer NX200, NX210, NX500 and NX600 | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-03-23T19:16:54.799Z
Reserved: 2026-01-13T19:45:14.017Z
Link: CVE-2025-15518
Updated: 2026-03-23T19:07:21.303Z
Status : Received
Published: 2026-03-23T18:16:23.630
Modified: 2026-03-23T18:16:23.630
Link: CVE-2025-15518
No data.
OpenCVE Enrichment
No data.