Description

Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.

INFO

Published Date :

2026-03-23T18:01:50.036Z

Last Modified :

2026-03-24T03:56:00.901Z

Source :

TPLink
AFFECTED PRODUCTS

The following products are affected by CVE-2025-15519 vulnerability.

Vendors Products
Tp-link
  • Archer Nx200
  • Archer Nx200 Firmware
  • Archer Nx200 V1.0
  • Archer Nx200 V2.0
  • Archer Nx200 V2.20
  • Archer Nx200 V3.0
  • Archer Nx210
  • Archer Nx210 Firmware
  • Archer Nx210 V2.0 V2.20
  • Archer Nx210 V3.0
  • Archer Nx500
  • Archer Nx500 Firmware
  • Archer Nx500 V1.0
  • Archer Nx500 V2.0
  • Archer Nx600
  • Archer Nx600 Firmware
  • Archer Nx600 V1.0
  • Archer Nx600 V2.0
  • Archer Nx600 V3.0

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact