Leading network equipment manufacturer TP-Link has issued critical patches for several high-severity vulnerabilities discovered in its Archer NX router series. These vulnerabilities, identified in models NX200, NX210, NX500, and NX600, could potentially allow attackers to fully compromise affected devices.
Details of the Vulnerabilities
The vulnerabilities, cataloged as CVE-2025-15517, CVE-2025-15518, CVE-2025-15519, and CVE-2025-15605, have been addressed in recent firmware updates. CVE-2025-15517, a particularly concerning flaw, permits unauthorized access, enabling malicious actors to perform sensitive operations such as firmware updates and configuration changes without proper authentication.
CVE-2025-15518 and CVE-2025-15519 are command injection vulnerabilities that necessitate administrative privileges for exploitation. Meanwhile, CVE-2025-15605 arises from the use of a hardcoded cryptographic key for encrypting and decrypting configuration files, which could be exploited to manipulate these files.
Broader Impact and Related Discoveries
Just a day prior to these patches, Cisco’s Talos Intelligence Group released details about 10 vulnerabilities impacting TP-Link’s Archer AX53 routers. These included nine memory safety issues and a misconfiguration that could result in credential leaks. Potential exploitation of these vulnerabilities might allow remote code execution and credential interception via man-in-the-middle attacks.
Talos had alerted TP-Link to these issues in October, prompting the company to release firmware updates for its Archer AX53 v1.0 models by early February. Talos has now disclosed technical specifics for all 10 router vulnerabilities, alongside 19 security flaws in the Canva Affinity tool and a critical issue in Hikvision’s facial recognition systems.
Future Implications and Security Enhancements
The disclosure and patching of these vulnerabilities underscore the critical importance of timely software updates and vigilant cybersecurity practices. The identified flaws highlight potential risks to network security, reinforcing the necessity for users to update their firmware promptly to safeguard their devices from malicious exploits.
As TP-Link continues to address these flaws, the company reaffirms its commitment to enhancing the security of its products. Users are encouraged to stay informed about updates and implement patches as soon as they become available to mitigate potential threats.
