The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.
References
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
History
12 Feb 2026, 16:24
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.tp-link.com/en/support/download/archer-c20/v6/#Firmware - Product | |
| References | () https://www.tp-link.com/en/support/download/archer-mr200/v5.20/#Firmware - Product | |
| References | () https://www.tp-link.com/en/support/download/tl-wr845n/#Firmware - Product | |
| References | () https://www.tp-link.com/in/support/download/archer-c20/v6/#Firmware - Product | |
| References | () https://www.tp-link.com/in/support/download/archer-mr200/v5.20/#Firmware - Product | |
| References | () https://www.tp-link.com/in/support/download/tl-wr845n/#Firmware - Product | |
| References | () https://www.tp-link.com/in/support/download/tl-wr850n/#Firmware - Product | |
| References | () https://www.tp-link.com/us/support/faq/4948/ - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.6 |
| First Time |
Tp-link
Tp-link archer C20 Firmware Tp-link tl-wr850n Firmware Tp-link archer Mr200 Firmware Tp-link archer Mr200 Tp-link tl-wr850n Tp-link archer C20 Tp-link tl-wr845n Tp-link tl-wr845n Firmware |
|
| CPE | cpe:2.3:h:tp-link:tl-wr850n:3:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_c20:6:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr850n_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_c20_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tl-wr845n_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tl-wr845n:4:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_mr200_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_mr200:5.20:*:*:*:*:*:*:* |
05 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-05 18:16
Updated : 2026-02-12 16:24
NVD link : CVE-2025-15551
Mitre link : CVE-2025-15551
CVE.ORG link : CVE-2025-15551
JSON object : View
Products Affected
tp-link
- tl-wr845n
- tl-wr850n_firmware
- tl-wr850n
- tl-wr845n_firmware
- archer_c20
- archer_mr200
- archer_c20_firmware
- archer_mr200_firmware
CWE
CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
