A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations.
References
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
Configuration 8 (hide)
| AND |
|
Configuration 9 (hide)
| AND |
|
Configuration 10 (hide)
| AND |
|
History
31 Mar 2026, 19:08
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Tp-link
Tp-link archer Nx200 Tp-link archer Nx210 Tp-link archer Nx600 Tp-link archer Nx600 Firmware Tp-link archer Nx200 Firmware Tp-link archer Nx500 Tp-link archer Nx210 Firmware Tp-link archer Nx500 Firmware |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
| CPE | cpe:2.3:h:tp-link:archer_nx200:2.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_nx200_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx200:3.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx210:2.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx200:1.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx500:1.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx600:3.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx210:3.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_nx600_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx600:2.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_nx500_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx500:2.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx210:2.20:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx600:1.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_nx210_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx200:2.20:*:*:*:*:*:*:* |
|
| Summary |
|
|
| References | () https://www.tp-link.com/en/support/download/archer-nx200/#Firmware - Product | |
| References | () https://www.tp-link.com/en/support/download/archer-nx210/#Firmware - Product | |
| References | () https://www.tp-link.com/en/support/download/archer-nx500/#Firmware - Product | |
| References | () https://www.tp-link.com/en/support/download/archer-nx600/#Firmware - Product | |
| References | () https://www.tp-link.com/us/support/faq/5027/ - Vendor Advisory |
23 Mar 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-23 18:16
Updated : 2026-03-31 19:08
NVD link : CVE-2025-15517
Mitre link : CVE-2025-15517
CVE.ORG link : CVE-2025-15517
JSON object : View
Products Affected
tp-link
- archer_nx500
- archer_nx600
- archer_nx210
- archer_nx500_firmware
- archer_nx210_firmware
- archer_nx600_firmware
- archer_nx200
- archer_nx200_firmware
CWE
CWE-306
Missing Authentication for Critical Function
