Attackers can load manipulated firmware onto TP-Link routers

In current firmwares for TP-Link's Archer routers, developers have closed four security vulnerabilities.

listen Print view

(Image: ZinaidaSopina/Shutterstock.com)

1 min. read

Due to several software vulnerabilities, attackers can completely compromise TP-Link Archer series routers. All now-closed vulnerabilities are classified as “high” in terms of threat level.

So far, there are no indications of ongoing attacks. The manufacturer advises owners to install the available security patches promptly.

Specifically, models Archer NX200, NX210, NX500, and NX600 are threatened. In a warning message, the developers assure that the vulnerabilities in firmwares 1.3.0 Build 260311, 1.3.0 Build 260309, 1.4.0 Build 260311, 1.5.0 Build 260309, and 1.8.0 Build 260311 have been closed. According to the developers, all previous versions are vulnerable.

An authentication vulnerability in the HTTP server (CVE-2025-15517) is considered the most dangerous. At this point, attackers can access devices without logging in and, in the worst case, upload and install firmware prepared with malicious code.

For the exploitation of two further vulnerabilities (CVE-2026-15518, CVE-2026-15519), attackers require admin rights. If this is the case, they can execute their commands at the operating system level.

Videos by heise

Due to a hard-coded cryptographic key in the context of device configuration, attackers can tamper with settings (CVE-2025-15605).

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.