The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability.
References
| Link | Resource |
|---|---|
| https://nico-security.com/posts/cve-2025-15545 | Exploit Third Party Advisory |
| https://www.tp-link.com/en/support/download/re605x/v3/#Firmware | Product |
| https://www.tp-link.com/us/support/download/re605x/v3/#Firmware | Product |
| https://www.tp-link.com/us/support/faq/4929/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
09 Mar 2026, 16:55
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://nico-security.com/posts/cve-2025-15545 - Exploit, Third Party Advisory | |
| References | () https://www.tp-link.com/en/support/download/re605x/v3/#Firmware - Product | |
| References | () https://www.tp-link.com/us/support/download/re605x/v3/#Firmware - Product | |
| References | () https://www.tp-link.com/us/support/faq/4929/ - Vendor Advisory | |
| CPE | cpe:2.3:o:tp-link:archer_re605x_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_re605x:3.0:*:*:*:*:*:*:* |
|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.8 |
| Summary |
|
|
| First Time |
Tp-link
Tp-link archer Re605x Firmware Tp-link archer Re605x |
31 Jan 2026, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
29 Jan 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-29 18:16
Updated : 2026-03-09 16:55
NVD link : CVE-2025-15545
Mitre link : CVE-2025-15545
CVE.ORG link : CVE-2025-15545
JSON object : View
Products Affected
tp-link
- archer_re605x
- archer_re605x_firmware
CWE
