Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2914 articles · 109744 vulns · 38/41 feeds (7d)
← Back to list
7.3
CVE-2025-15605PATCHED
tp-link · archer_nx600_firmware

A hardcoded cryptographic key within the configuration mechanism on TP-Link Archer NX200, NX210, NX500 and NX600 enables decryption and re-encryption of device configuration data. An authenticated att

Description

A hardcoded cryptographic key within the configuration mechanism on TP-Link Archer NX200, NX210, NX500 and NX600 enables decryption and re-encryption of device configuration data. An authenticated attacker may decrypt configuration files, modify them, and re-encrypt them, affecting the confidentiality and integrity of device configuration data.

Affected Products

VendorProductVersions
tp-linkarcher_nx600_firmware< 1.3.0, < 1.5.0, < 1.3.0, < 1.3.0, < 1.3.0, < 1.4.0, < 1.3.0, < 1.3.0, < 1.3.0, < 1.8.0

References

  • https://www.tp-link.com/en/support/download/archer-nx200/#Firmware(Product)
  • https://www.tp-link.com/en/support/download/archer-nx210/#Firmware(Product)
  • https://www.tp-link.com/en/support/download/archer-nx500/#Firmware(Product)
  • https://www.tp-link.com/en/support/download/archer-nx600/#Firmware(Product)
  • https://www.tp-link.com/us/support/faq/5027/(Vendor Advisory)

Related News (1 articles)

Tier D
Heise Security15d ago
Angreifer können manipulierte Firmware auf TP-Link-Router laden
→ No new info (linked only)
CVSS 3.17.3 HIGH
VectorCVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
CISA KEV❌ No
Actively exploited❌ No
Patch available
1.3.01.5.01.4.01.8.0
CWECWE-321, CWE-798
PublishedMar 23, 2026
Last enriched8d ago
Trending Score4
Source articles1
Independent1
Info Completeness9/14
Missing: epss, kev, exploit, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2025-62501
SSH Hostkey misconfiguration vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows attackers to obtain device credentials through a specially crafted man‑in‑the‑middle (MITM) attack. Th
Trending: 4
HIGHCVE-2025-15519
Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An
Trending: 4
HIGHCVE-2025-15518
Improper input handling in a wireless-control administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An
Trending: 4
HIGHCVE-2025-62673
Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tdpserver modules) allows adjacent attackers to cause a segmentation fault or potentially execute arbitrary code via a specially c
Trending: 4
HIGHCVE-2025-15517
A missing authentication check in the HTTP server on TP-Link Archer NX200, NX210, NX500 and NX600 to certain cgi endpoints allows unauthenticated access intended for authenticated users. An attacker m
Trending: 4

Pin to Dashboard

Verification

State: verified
Confidence: 100%

Vulnerability Timeline

CVE Published
Mar 23, 2026
Patch Available
Mar 31, 2026
Discovered by ZDM
Apr 1, 2026