Click to skip the navigation bar

Security Advisory on Authenticated Command injection Vulnerability in Archer MR600 (CVE-2025-14756)

Security Advisory
Updated 01-26-2026 18:13:15 PM Number of views for this article76

Vulnerability Description:

Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console.

Impact:

The vulnerability allows an authenticated attacker to inject system commands via the admin interface, leading to service disruption or full compromise.

CVSS v4.0 Score: 8.5 / High

CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Product Model

Related Vulnerabilities

Affected Version

Archer MR600 v5

CVE-2025-14756

<1.1.0 0.9.1 v0001.0 Build 250930 Rel.63611n

Recommendations:

We strongly recommend that users with affected devices take the following actions:

  1. Download and update to the latest firmware version to fix the vulnerabilities.

EN: Download for Archer MR600 | TP-Link

JP: Archer MR600 のコンテンツ | TP-Link 日本

This product is not sold in the US.

Disclaimer:

If you do not take all of the recommended actions, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this advisory.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >