Click to skip the navigation bar

Statement on Clickjacking vulnerability on the management web application of TP-Link Archer C1200 (CVE-2025-6983)

Security Advisory
Updated 07-16-2025 18:51:08 PM Number of views for this article193

Important Information:

This device has reached end-of-life (EOL); therefore, please review the ‘Recommendation(s)’ section carefully.

Vulnerability Description:

A Clickjacking vulnerability in TP-Link Archer C1200 web management page allows an attacker to trick users into performing unintended actions via rendered UI layers or frames.

Impact:

If a user visits a malicious page while logged into the management web application, they may be tricked into interacting with hidden UI elements, potentially leading to unintended actions.

CVSS v4.0 Score: 5.1 / Medium

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Product Model

Related Vulnerabilities

Affected Version

Archer C1200

CVE-2025-6983

<= 1.1.5

Recommendation(s):

We strongly recommended that users with the affected device(s) take the following action(s):

  1. Upgrade the device to one of our supported models to be able to receive automatic updates for ongoing protection.

Disclaimer:

If you do not take the recommended action(s) stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended action(s) in this statement.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >