The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.
References
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-05 18:16
Updated : 2026-02-12 16:24
NVD link : CVE-2025-15551
Mitre link : CVE-2025-15551
CVE.ORG link : CVE-2025-15551
JSON object : View
Products Affected
tp-link
- archer_c20
- archer_mr200
- tl-wr850n_firmware
- archer_c20_firmware
- tl-wr845n
- archer_mr200_firmware
- tl-wr845n_firmware
- tl-wr850n
CWE
CWE-95
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
