CVE-2025-15551

MEDIUM

TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, TL-WR845N v4 - RCE

Title source: llm
STIX 2.1

Description

The response coming from TP-Link Archer MR200 v5.2, C20 v5 and v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.

Scores

CVSS v3 5.6
EPSS 0.0004
EPSS Percentile 13.0%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-95
Status published
Products (10)
TP Link Systems Inc./TL-WR845N v4 < 0.9.1 3.19 Build 251031 rel33710
TP Link Systems Inc./TL-WR850N v3 < 3.16.0 0.9.1 v6031.0 Build 251205 Rel.22089n
tp-link/archer_c20_firmware < 250630
tp-link/archer_mr200_firmware < 250917
tp-link/tl-wr845n_firmware < 251031
tp-link/tl-wr850n_firmware < 0.9.1_Build251205
TP-Link Systems Inc./Archer C20 v5 < EU_V5_260317
TP-Link Systems Inc./Archer C20 v5 < US_V5_260419
TP-Link Systems Inc./Archer C20 v6 < 0.9.1 4.19 v0001.0 Build 250630 Rel.56583n
TP-Link Systems Inc./Archer MR200 v5.2 < 1.2.0 Build 250917 Rel.51746
Published Feb 05, 2026
Tracked Since Feb 18, 2026