Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise.
References
| Link | Resource |
|---|---|
| https://jvn.jp/en/vu/JVNVU94651499/ | Third Party Advisory |
| https://jvn.jp/vu/JVNVU94651499/ | Third Party Advisory |
| https://www.tp-link.com/en/support/download/archer-mr600/#Firmware | Product |
| https://www.tp-link.com/jp/support/download/archer-mr600/#Firmware | Product |
| https://www.tp-link.com/us/support/faq/4916/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-26 19:16
Updated : 2026-03-09 14:07
NVD link : CVE-2025-14756
Mitre link : CVE-2025-14756
CVE.ORG link : CVE-2025-14756
JSON object : View
Products Affected
tp-link
- archer_mr600_firmware
- archer_mr600
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
