Summary
TP-Link patched four high-severity vulnerabilities in its Archer NX router series, including a authentication bypass (CVE-2025-15517) that allows unauthenticated attackers to upload malicious firmware and take full control of the device.
Take Action:
If you own a TP-Link Archer NX router (NX600, NX500, NX210, or NX200), make sure it is isolated from the internet and accessible from trusted networks only. Then plan a quick patch to the latest firmware from the official TP-Link Support portal for your specific hardware version. Disable remote management and ensure the admin interface is only reachable from your internal network.
Read the full article on BeyondMachines
This article was originally published on BeyondMachines
Top comments (0)