The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability.
References
| Link | Resource |
|---|---|
| https://nico-security.com/posts/cve-2025-15545 | Exploit Third Party Advisory |
| https://www.tp-link.com/en/support/download/re605x/v3/#Firmware | Product |
| https://www.tp-link.com/us/support/download/re605x/v3/#Firmware | Product |
| https://www.tp-link.com/us/support/faq/4929/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-29 18:16
Updated : 2026-03-09 16:55
NVD link : CVE-2025-15545
Mitre link : CVE-2025-15545
CVE.ORG link : CVE-2025-15545
JSON object : View
Products Affected
tp-link
- archer_re605x_firmware
- archer_re605x
CWE
