Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link archer Nx200 V1.0 Tp-link archer Nx200 V2.0 Tp-link archer Nx200 V2.20 Tp-link archer Nx200 V3.0 Tp-link archer Nx210 V2.0 V2.20 Tp-link archer Nx210 V3.0 Tp-link archer Nx500 V1.0 Tp-link archer Nx500 V2.0 Tp-link archer Nx600 V1.0 Tp-link archer Nx600 V2.0 Tp-link archer Nx600 V3.0 |
|
| Vendors & Products |
Tp-link
Tp-link archer Nx200 V1.0 Tp-link archer Nx200 V2.0 Tp-link archer Nx200 V2.20 Tp-link archer Nx200 V3.0 Tp-link archer Nx210 V2.0 V2.20 Tp-link archer Nx210 V3.0 Tp-link archer Nx500 V1.0 Tp-link archer Nx500 V2.0 Tp-link archer Nx600 V1.0 Tp-link archer Nx600 V2.0 Tp-link archer Nx600 V3.0 |
Mon, 23 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device. | |
| Title | Command Injection in Modem Management CLI on TP-Link Archer NX200, NX210, NX500 and NX600 | |
| Weaknesses | CWE-78 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-03-24T03:56:00.901Z
Reserved: 2026-01-13T19:45:17.342Z
Link: CVE-2025-15519
Updated: 2026-03-23T19:07:23.210Z
Status : Awaiting Analysis
Published: 2026-03-23T18:16:23.840
Modified: 2026-03-24T15:54:09.400
Link: CVE-2025-15519
No data.
OpenCVE Enrichment
Updated: 2026-03-24T10:33:28Z