Description

The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.

INFO

Published Date :

2026-02-05T17:22:55.600Z

Last Modified :

2026-02-05T20:31:56.005Z

Source :

TPLink
AFFECTED PRODUCTS

The following products are affected by CVE-2025-15551 vulnerability.

Vendors Products
Tp-link
  • Archer C20
  • Archer C20 Firmware
  • Archer Mr200
  • Archer Mr200 Firmware
  • Tl-wr845n
  • Tl-wr845n Firmware
  • Tl-wr850n
  • Tl-wr850n Firmware

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact