A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations.
Authorization Bypass in HTTP Server Endpoints on TP-Link Archer NX200, NX210, NX500 and NX600
Problem type
Affected products
TP-Link Systems Inc.
< 1.3.0 Build 260309 - AFFECTED
< 1.3.0 Build 260311 - AFFECTED
< 1.4.0 Build 260311 - AFFECTED
< < 1.5.0 Build 260309 - AFFECTED
< 1.3.0 Build 260311 - AFFECTED
< 1.3.0 Build 260309 - AFFECTED
< 1.3.0 Build 260311 - AFFECTED
< < 1.3.0 Build 260309 - AFFECTED
< 1.3.0 Build 260311 - AFFECTED
< 1.3.0 Build 260311 - AFFECTED
< 1.8.0 Build 260311 - AFFECTED
References
https://www.tp-link.com/en/support/download/archer-nx200/#Firmware
https://www.tp-link.com/en/support/download/archer-nx210/#Firmware
https://www.tp-link.com/en/support/download/archer-nx500/#Firmware
https://www.tp-link.com/en/support/download/archer-nx600/#Firmware
https://www.tp-link.com/us/support/faq/5027/
GitHub Security Advisories
GHSA-vfwf-qwpx-47fh
A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600...
https://github.com/advisories/GHSA-vfwf-qwpx-47fhA missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations.
https://nvd.nist.gov/vuln/detail/CVE-2025-15517
https://www.tp-link.com/en/support/download/archer-nx200/#Firmware
https://www.tp-link.com/en/support/download/archer-nx210/#Firmware
https://www.tp-link.com/en/support/download/archer-nx500/#Firmware
https://www.tp-link.com/en/support/download/archer-nx600/#Firmware
https://www.tp-link.com/us/support/faq/5027
https://github.com/advisories/GHSA-vfwf-qwpx-47fh
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-15517Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-15517",
"assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"assignerShortName": "TPLink",
"dateUpdated": "2026-03-23T19:16:54.459Z",
"dateReserved": "2026-01-13T19:43:48.978Z",
"datePublished": "2026-03-23T18:01:31.162Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"shortName": "TPLink",
"dateUpdated": "2026-03-23T18:01:31.162Z"
},
"title": "Authorization Bypass in HTTP Server Endpoints on TP-Link Archer NX200, NX210, NX500 and NX600",
"descriptions": [
{
"lang": "en",
"value": "A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker may perform privileged HTTP actions without authentication, including firmware upload and configuration operations."
}
]
}
],
"affected": [
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX600 v3.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260309"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX600 v2.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX600 v1.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.4.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX500 v2.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "< 1.5.0 Build 260309"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX500 v1.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX210 v3.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260309"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX210 v2.0 v2.20",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX200 v3.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "< 1.3.0 Build 260309"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX200 v2.20",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX200 v2.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX200 v1.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.8.0 Build 260311"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-306 Missing Authentication for Critical Function",
"cweId": "CWE-306",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.tp-link.com/en/support/download/archer-nx200/#Firmware",
"tags": [
"patch"
]
},
{
"url": "https://www.tp-link.com/en/support/download/archer-nx210/#Firmware",
"tags": [
"patch"
]
},
{
"url": "https://www.tp-link.com/en/support/download/archer-nx500/#Firmware",
"tags": [
"patch"
]
},
{
"url": "https://www.tp-link.com/en/support/download/archer-nx600/#Firmware",
"tags": [
"patch"
]
},
{
"url": "https://www.tp-link.com/us/support/faq/5027/",
"tags": [
"vendor-advisory"
]
}
],
"impacts": [
{
"capecId": "CAPEC-115",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-115 Authentication Bypass"
}
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Saifeldeen Aziz from Cyshield",
"type": "finder"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2026-03-23T19:16:54.459Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}