Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Patch Now: TP-Link Archer NX Routers Vulnerable to Firmware Takeover



TP-Link has recently released security patches for its Archer NX routers to address several high-severity vulnerabilities that could allow attackers to bypass authentication and install malicious firmware. The patches aim to fix multiple issues, including CVE-2025-15517 and CVE-2025-15605, which impact multiple models of the Archer NX series. To protect themselves, users are urged to download and install the latest firmware version as soon as possible.

  • TP-Link has released security patches for its Archer NX series routers to address several vulnerabilities.
  • CVE-2025-15517 allows attackers to upload new firmware without privileges, posing a high risk of compromise if unpatched.
  • CVE-2025-15605 enables authenticated attackers to decrypt and modify configuration files.
  • The U.S. Cybersecurity and Infrastructure Security Agency has added TP-Link Archer C7(EU) and TL-WR841N flaws to its Known Exploited Vulnerabilities (KEV) catalog.



  • TP-Link, a well-known manufacturer of routers and other networking equipment, has recently released security patches for its Archer NX series of routers. The patches are aimed at addressing several vulnerabilities in the firmware that could allow attackers to bypass authentication and install malicious firmware.

    According to the context data provided, CVE-2025-15517 is one such vulnerability that impacts multiple models of the Archer NX series, including the NX200, NX210, NX500, and NX600. This vulnerability allows attackers to upload new firmware without privileges, creating a high risk of compromise if unpatched.

    The vulnerability was discovered by Pierluigi Paganini, who highlights in his article that "A missing authentication check in the HTTP server to certain cgi endpoints allows unauthenticated access intended for authenticated users." This means that even if an attacker has not obtained administrative credentials, they can still perform privileged actions such as firmware upload and configuration operations.

    Furthermore, CVE-2025-15605 is another vulnerability that impacts TP-Link Archer NX routers. This vulnerability was discovered in the Configuration Encryption Mechanism and allows authenticated attackers to decrypt configuration files, modify them, and re-encrypt them. According to Paganini, "A hardcoded cryptographic key within its configuration mechanism enables decryption and re-encryption of device configuration data."

    The impact of these vulnerabilities is significant, as they could allow attackers to gain unauthorized access to the router's firmware and configuration data. This could lead to a range of potential consequences, including the installation of malicious firmware that could compromise the security of connected devices.

    In response to these vulnerabilities, TP-Link has released security patches for its Archer NX routers. The company urges customers to download and install the latest firmware version to address these issues.

    However, the recent patching of these vulnerabilities is not an isolated incident. According to the context data provided, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added TP-Link Archer C7(EU) and TL-WR841N flaws to its Known Exploited Vulnerabilities (KEV) catalog. This means that these devices are now considered to be at risk of exploitation by malicious actors.

    The recent ban on importing new foreign-made consumer routers in the U.S., backed by Executive Branch assessments, highlights the growing concern over cyber and national security risks associated with unsecured networking equipment. The decision aims to protect the country's network infrastructure from potential threats.

    In light of these vulnerabilities, it is essential for users to take proactive measures to secure their TP-Link Archer NX routers. This includes downloading and installing the latest firmware patches and keeping an eye out for any suspicious activity on the device.

    Furthermore, the recent patching of these vulnerabilities serves as a reminder that cybersecurity is not just about responding to threats after they have occurred. It also requires continuous monitoring and proactive measures to prevent potential vulnerabilities from being exploited in the first place.

    In conclusion, the recent vulnerability in TP-Link Archer NX routers highlights the importance of regular firmware updates and the need for users to stay vigilant when it comes to cybersecurity. By patching these vulnerabilities promptly, we can reduce the risk of cyber attacks and protect our devices and networks from potential threats.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/Patch-Now-TP-Link-Archer-NX-Routers-Vulnerable-to-Firmware-Takeover-ehn.shtml

  • https://securityaffairs.com/189980/iot/patch-now-tp-link-archer-nx-routers-vulnerable-to-firmware-takeover.html

  • https://www.bleepingcomputer.com/news/security/tp-link-warns-users-to-patch-critical-router-auth-bypass-flaw/

  • https://infosecbulletin.com/tp-link-alerts-users-to-patch-router-auth-bypass-vulnerability/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-15517

  • https://www.cvedetails.com/cve/CVE-2025-15517/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-15605

  • https://www.cvedetails.com/cve/CVE-2025-15605/


  • Published: Wed Mar 25 11:44:50 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us