Security Advisory on Authenticated Command injection Vulnerability in Archer MR600 (CVE-2025-14756)
Vulnerability Description:
Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console.
Impact:
The vulnerability allows an authenticated attacker to inject system commands via the admin interface, leading to service disruption or full compromise.
CVSS v4.0 Score: 8.5 / High
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products/Versions and Fixes:
|
Affected Product Model |
Related Vulnerabilities |
Affected Version |
|
Archer MR600 v5 |
CVE-2025-14756 |
<1.1.0 0.9.1 v0001.0 Build 250930 Rel.63611n |
Recommendations:
We strongly recommend that users with affected devices take the following actions:
- Download and update to the latest firmware version to fix the vulnerabilities.
EN: Download for Archer MR600 | TP-Link
JP: Archer MR600 のコンテンツ | TP-Link 日本
This product is not sold in the US.
Disclaimer:
If you do not take all of the recommended actions, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this advisory.
Is this faq useful?
Your feedback helps improve this site.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.