Click to skip the navigation bar

Security Advisory on Insufficient Backup File Upload Input Validation on Archer RE605X (CVE-2025-15545)

Security Advisory
Updated 01-29-2026 17:30:06 PM Number of views for this article106

Vulnerability Description:

CVE-2025-15545

The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges.

CVSS v4.0 Score: 7.3 / High

CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Impact:

Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability.

Affected Products/Versions and Fixes:

Affected Product Model

Affected Version

Archer RE605X V3.0

<(EU)_V3_20260113

<(US)_V3_20260126

Recommendations:

We strongly recommend that users with affected devices take the following actions:

  1. Download and update to the latest firmware version to fix the vulnerabilities.

EN: Download for RE605X | TP-Link

US: Download for RE605X | TP-Link

Disclaimer:

If you do not take all recommended actions, this vulnerability will remain. TP-Link cannot bear any responsibility for consequences that could have been avoided by following this advisory.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >