CVE-2025-15551
MEDIUMTP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, TL-WR845N v4 - RCE
Title source: llmDescription
The response coming from TP-Link Archer MR200 v5.2, C20 v5 and v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.
References (10)
Scores
CVSS v3
5.6
EPSS
0.0004
EPSS Percentile
13.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-95
Status
published
Products (10)
TP Link Systems Inc./TL-WR845N v4
< 0.9.1 3.19 Build 251031 rel33710
TP Link Systems Inc./TL-WR850N v3
< 3.16.0 0.9.1 v6031.0 Build 251205 Rel.22089n
tp-link/archer_c20_firmware
< 250630
tp-link/archer_mr200_firmware
< 250917
tp-link/tl-wr845n_firmware
< 251031
tp-link/tl-wr850n_firmware
< 0.9.1_Build251205
TP-Link Systems Inc./Archer C20 v5
< EU_V5_260317
TP-Link Systems Inc./Archer C20 v5
< US_V5_260419
TP-Link Systems Inc./Archer C20 v6
< 0.9.1 4.19 v0001.0 Build 250630 Rel.56583n
TP-Link Systems Inc./Archer MR200 v5.2
< 1.2.0 Build 250917 Rel.51746
Published
Feb 05, 2026
Tracked Since
Feb 18, 2026