{"api_version":"1","generated_at":"2026-04-23T02:24:49+00:00","cve":"CVE-2025-15518","urls":{"html":"https://cve.report/CVE-2025-15518","api":"https://cve.report/api/cve/CVE-2025-15518.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-15518","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-15518"},"summary":{"title":"Command Injection in Wireless Control CLI on TP-Link Archer NX200, NX210, NX500 and NX600","description":"Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.","state":"PUBLISHED","assigner":"TPLink","published_at":"2026-03-23 18:16:23","updated_at":"2026-03-31 19:05:01"},"problem_types":["CWE-78","CWE-78 CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"],"metrics":[{"version":"4.0","source":"f23511db-6c3e-4e32-a477-6aa17d310630","type":"Secondary","score":"8.5","severity":"HIGH","vector":"CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.5,"baseSeverity":"HIGH","attackVector":"ADJACENT","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"CVSS","score":"8.5","severity":"HIGH","vector":"CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","data":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":8.5,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"}},{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"references":[{"url":"https://www.tp-link.com/us/support/faq/5027/","name":"https://www.tp-link.com/us/support/faq/5027/","refsource":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.tp-link.com/en/support/download/archer-nx210/#Firmware","name":"https://www.tp-link.com/en/support/download/archer-nx210/#Firmware","refsource":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.tp-link.com/en/support/download/archer-nx500/#Firmware","name":"https://www.tp-link.com/en/support/download/archer-nx500/#Firmware","refsource":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.tp-link.com/en/support/download/archer-nx600/#Firmware","name":"https://www.tp-link.com/en/support/download/archer-nx600/#Firmware","refsource":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.tp-link.com/en/support/download/archer-nx200/#Firmware","name":"https://www.tp-link.com/en/support/download/archer-nx200/#Firmware","refsource":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-15518","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-15518","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"Archer NX600 v3.0","version":"affected 1.3.0 Build 260309 custom","platforms":["Linux"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"Archer NX600 v2.0","version":"affected 1.3.0 Build 260311 custom","platforms":["Linux"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"Archer NX600 v1.0","version":"affected 1.4.0 Build 260311 custom","platforms":["Linux"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"Archer NX500 v2.0","version":"affected < 1.5.0 Build 260309 custom","platforms":["Linux"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"Archer NX500 v1.0","version":"affected 1.3.0 Build 260311 custom","platforms":["Linux"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"Archer NX210 v3.0","version":"affected 1.3.0 Build 260309 custom","platforms":["Linux"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"Archer NX210 v2.0 v2.20","version":"affected 1.3.0 Build 260311 custom","platforms":["Linux"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"Archer NX200 v3.0","version":"affected < 1.3.0 Build 260309 custom","platforms":["Linux"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"Archer NX200 v2.20","version":"affected 1.3.0 Build 260311 custom","platforms":["Linux"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"Archer NX200 v2.0","version":"affected 1.3.0 Build 260311 custom","platforms":["Linux"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"Archer NX200 v1.0","version":"affected 1.8.0 Build 260311 custom","platforms":["Linux"]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Saifeldeen Aziz from Cyshield","lang":"en"}],"nvd_cpes":[{"cve_year":"2025","cve_id":"15518","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"tp-link","cpe5":"archer_nx200","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2025","cve_id":"15518","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"tp-link","cpe5":"archer_nx200_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2025","cve_id":"15518","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"tp-link","cpe5":"archer_nx210","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2025","cve_id":"15518","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"tp-link","cpe5":"archer_nx210_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2025","cve_id":"15518","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"tp-link","cpe5":"archer_nx500","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2025","cve_id":"15518","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"tp-link","cpe5":"archer_nx500_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2025","cve_id":"15518","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"tp-link","cpe5":"archer_nx600","cpe6":"3.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2025","cve_id":"15518","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"tp-link","cpe5":"archer_nx600_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2025-15518","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-03-23T00:00:00+00:00","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-24T03:55:59.756Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Archer NX600 v3.0","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.3.0 Build 260309","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Archer NX600 v2.0","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.3.0 Build 260311","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Archer NX600 v1.0","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.4.0 Build 260311","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Archer NX500 v2.0","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"< 1.5.0 Build 260309","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Archer NX500 v1.0","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.3.0 Build 260311","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Archer NX210 v3.0","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.3.0 Build 260309","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Archer NX210 v2.0 v2.20","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.3.0 Build 260311","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Archer NX200 v3.0","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"< 1.3.0 Build 260309","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Archer NX200 v2.20","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.3.0 Build 260311","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Archer NX200 v2.0","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.3.0 Build 260311","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Linux"],"product":"Archer NX200 v1.0","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.8.0 Build 260311","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Saifeldeen Aziz from Cyshield"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device."}],"value":"Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device."}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88 OS Command Injection"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":8.5,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"HIGH","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-78","description":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-23T18:01:39.070Z","orgId":"f23511db-6c3e-4e32-a477-6aa17d310630","shortName":"TPLink"},"references":[{"tags":["patch"],"url":"https://www.tp-link.com/en/support/download/archer-nx200/#Firmware"},{"tags":["patch"],"url":"https://www.tp-link.com/en/support/download/archer-nx210/#Firmware"},{"tags":["patch"],"url":"https://www.tp-link.com/en/support/download/archer-nx500/#Firmware"},{"tags":["patch"],"url":"https://www.tp-link.com/en/support/download/archer-nx600/#Firmware"},{"tags":["vendor-advisory"],"url":"https://www.tp-link.com/us/support/faq/5027/"}],"source":{"discovery":"UNKNOWN"},"title":"Command Injection in Wireless Control CLI on TP-Link Archer NX200, NX210, NX500 and NX600","x_generator":{"engine":"Vulnogram 0.5.0"}}},"cveMetadata":{"assignerOrgId":"f23511db-6c3e-4e32-a477-6aa17d310630","assignerShortName":"TPLink","cveId":"CVE-2025-15518","datePublished":"2026-03-23T18:01:39.070Z","dateReserved":"2026-01-13T19:45:14.017Z","dateUpdated":"2026-03-24T03:55:59.756Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-23 18:16:23","lastModifiedDate":"2026-03-31 19:05:01","problem_types":["CWE-78","CWE-78 CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')"],"metrics":{"cvssMetricV40":[{"source":"f23511db-6c3e-4e32-a477-6aa17d310630","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":8.5,"baseSeverity":"HIGH","attackVector":"ADJACENT","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"HIGH","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:archer_nx600_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.0","matchCriteriaId":"77429691-1193-4480-A64E-E1FB19D6A073"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx600:3.0:*:*:*:*:*:*:*","matchCriteriaId":"58132EDD-47B7-4E46-B280-FE58A920AE43"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:archer_nx500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.5.0","matchCriteriaId":"70EF52E9-1D92-4778-99C5-3B76B81681FA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx500:2.0:*:*:*:*:*:*:*","matchCriteriaId":"40D78DBB-CAEA-4C2E-B703-2898B73A0A5E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:archer_nx210_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.0","matchCriteriaId":"22EA51B1-332E-48BB-BDBA-09A99ECB942F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx210:3.0:*:*:*:*:*:*:*","matchCriteriaId":"DA336E76-7910-4780-BCA0-1DA2AA7F9418"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:archer_nx200_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.0","matchCriteriaId":"48125D02-70B1-4448-BB33-4759FF0E3936"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx200:3.0:*:*:*:*:*:*:*","matchCriteriaId":"BD6E8279-6E92-47B5-9EEB-CD83355EF693"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:archer_nx600_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.0","matchCriteriaId":"77429691-1193-4480-A64E-E1FB19D6A073"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx600:2.0:*:*:*:*:*:*:*","matchCriteriaId":"D75A95F3-D299-4037-A755-A6818169762F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:archer_nx600_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.0","matchCriteriaId":"34DC2394-8F53-4C1C-A2AC-E23CE5CB6D2F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx600:1.0:*:*:*:*:*:*:*","matchCriteriaId":"0D20EAF3-A85A-42B1-AF19-D72292523593"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:archer_nx500_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.0","matchCriteriaId":"1EC93BA6-FB10-4993-838A-C82FA984B6BB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx500:1.0:*:*:*:*:*:*:*","matchCriteriaId":"581891F1-F50F-49B0-AB3D-B56ECF43F78B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:archer_nx210_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.0","matchCriteriaId":"22EA51B1-332E-48BB-BDBA-09A99ECB942F"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx210:2.0:*:*:*:*:*:*:*","matchCriteriaId":"0C230FE9-FBA9-4DAB-B7C1-2A270F57915C"},{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx210:2.20:*:*:*:*:*:*:*","matchCriteriaId":"FA0FC692-C2F1-4C0C-9502-84852BDCD7E3"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:archer_nx200_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.0","matchCriteriaId":"48125D02-70B1-4448-BB33-4759FF0E3936"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx200:2.0:*:*:*:*:*:*:*","matchCriteriaId":"A953B18E-F832-4EE9-8821-4F60DC031715"},{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx200:2.20:*:*:*:*:*:*:*","matchCriteriaId":"10E43B48-2BA2-45ED-9C43-AAD2B021B3D4"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:archer_nx200_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"1.8.0","matchCriteriaId":"98759C1B-F1B7-4EAC-BC4B-998ACB4B0C0B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:archer_nx200:1.0:*:*:*:*:*:*:*","matchCriteriaId":"4D2C0169-5369-42A5-B4E3-E7DBED807789"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"15518","Ordinal":"1","Title":"Command Injection in Wireless Control CLI on TP-Link Archer NX20","CVE":"CVE-2025-15518","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"15518","Ordinal":"1","NoteData":"Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.","Type":"Description","Title":"Command Injection in Wireless Control CLI on TP-Link Archer NX20"}]}}}