TP-Link patches critical vulnerability in Archer NX routers

TP-Link patches critical vulnerability in Archer NX routers

TP-Link has resolved a vulnerability that allowed attackers to bypass system authentication.

TP-Link has patched several security flaws in its Archer NX router series, including a critical vulnerability that allows unauthenticated attackers to gain full control over the device. The manufacturer is urging users to install the latest firmware as soon as possible.

Unauthenticated attacks possible

The most severe vulnerability, CVE-2025-15517, makes it possible to completely bypass authentication. This allows attackers to access functions normally reserved for administrators without logging in.

The flaw is located in the router’s HTTP server and allows for firmware uploads or configuration changes. In theory, this enables malicious actors to take full control of the network device. Affected models include the Archer NX200, NX210, NX500, and NX600.

Multiple security issues addressed simultaneously

In addition to the critical flaw, TP-Link has addressed other vulnerabilities. A hardcoded cryptographic key made it possible to obtain and manipulate configuration files. Furthermore, two flaws were patched that allowed attackers with admin privileges to execute arbitrary commands on the device.

TP-Link emphasizes that users must take action themselves to remain protected.