Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.
Command Injection in Modem Management CLI on TP-Link Archer NX200, NX210, NX500 and NX600
Problem type
Affected products
TP-Link Systems Inc.
< 1.3.0 Build 260309 - AFFECTED
< 1.3.0 Build 260311 - AFFECTED
< 1.4.0 Build 260311 - AFFECTED
< < 1.5.0 Build 260309 - AFFECTED
< 1.3.0 Build 260311 - AFFECTED
< 1.3.0 Build 260309 - AFFECTED
< 1.3.0 Build 260311 - AFFECTED
< < 1.3.0 Build 260309 - AFFECTED
< 1.3.0 Build 260311 - AFFECTED
< 1.3.0 Build 260311 - AFFECTED
< 1.8.0 Build 260311 - AFFECTED
References
https://www.tp-link.com/en/support/download/archer-nx200/#Firmware
https://www.tp-link.com/en/support/download/archer-nx210/#Firmware
https://www.tp-link.com/en/support/download/archer-nx500/#Firmware
https://www.tp-link.com/en/support/download/archer-nx600/#Firmware
https://www.tp-link.com/us/support/faq/5027/
GitHub Security Advisories
GHSA-553r-96gg-xwgx
Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200,...
https://github.com/advisories/GHSA-553r-96gg-xwgxImproper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.
https://nvd.nist.gov/vuln/detail/CVE-2025-15519
https://www.tp-link.com/en/support/download/archer-nx200/#Firmware
https://www.tp-link.com/en/support/download/archer-nx210/#Firmware
https://www.tp-link.com/en/support/download/archer-nx500/#Firmware
https://www.tp-link.com/en/support/download/archer-nx600/#Firmware
https://www.tp-link.com/us/support/faq/5027
https://github.com/advisories/GHSA-553r-96gg-xwgx
JSON source
https://cveawg.mitre.org/api/cve/CVE-2025-15519Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2025-15519",
"assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"assignerShortName": "TPLink",
"dateUpdated": "2026-03-23T19:16:54.966Z",
"dateReserved": "2026-01-13T19:45:17.342Z",
"datePublished": "2026-03-23T18:01:50.036Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"shortName": "TPLink",
"dateUpdated": "2026-03-23T18:01:50.036Z"
},
"title": "Command Injection in Modem Management CLI on TP-Link Archer NX200, NX210, NX500 and NX600",
"descriptions": [
{
"lang": "en",
"value": "Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device."
}
]
}
],
"affected": [
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX600 v3.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260309"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX600 v2.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX600 v1.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.4.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX500 v2.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "< 1.5.0 Build 260309"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX500 v1.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX210 v3.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260309"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX210 v2.0 v2.20",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX200 v3.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "< 1.3.0 Build 260309"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX200 v2.20",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX200 v2.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.3.0 Build 260311"
}
]
},
{
"vendor": "TP-Link Systems Inc.",
"product": "Archer NX200 v1.0",
"platforms": [
"Linux"
],
"defaultStatus": "unaffected",
"versions": [
{
"version": "0",
"status": "affected",
"versionType": "custom",
"lessThan": "1.8.0 Build 260311"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"lang": "en",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')",
"cweId": "CWE-78",
"type": "CWE"
}
]
}
],
"references": [
{
"url": "https://www.tp-link.com/en/support/download/archer-nx200/#Firmware",
"tags": [
"patch"
]
},
{
"url": "https://www.tp-link.com/en/support/download/archer-nx210/#Firmware",
"tags": [
"patch"
]
},
{
"url": "https://www.tp-link.com/en/support/download/archer-nx500/#Firmware",
"tags": [
"patch"
]
},
{
"url": "https://www.tp-link.com/en/support/download/archer-nx600/#Firmware",
"tags": [
"patch"
]
},
{
"url": "https://www.tp-link.com/us/support/faq/5027/",
"tags": [
"vendor-advisory"
]
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Saifeldeen Aziz from Cyshield",
"type": "finder"
}
]
},
"adp": [
{
"providerMetadata": {
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP",
"dateUpdated": "2026-03-23T19:16:54.966Z"
},
"title": "CISA ADP Vulnrichment",
"metrics": [
{}
]
}
]
}
}