CVE-2025-15551

The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_mr200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_mr200:5.20:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:archer_c20_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_c20:6:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:tp-link:tl-wr850n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr850n:3:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:tp-link:tl-wr845n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr845n:4:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-05 18:16

Updated : 2026-02-12 16:24


NVD link : CVE-2025-15551

Mitre link : CVE-2025-15551

CVE.ORG link : CVE-2025-15551


JSON object : View

Products Affected

tp-link

  • archer_c20
  • archer_mr200
  • tl-wr850n_firmware
  • archer_c20_firmware
  • tl-wr845n
  • archer_mr200_firmware
  • tl-wr845n_firmware
  • tl-wr850n
CWE
CWE-95

Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')