Click to skip the navigation bar

Security Advisory on Command Injection Vulnerability on TP-Link Archer AXE75 (CVE-2025-15568)

Security Advisory
Updated 03-09-2026 16:17:21 PM Number of views for this article98

Vulnerability and Impact Description:

CVE-2025-15568:

A command injection vulnerability was identified in the web module of Archer AXE75 v1.6/v1.0 router. An authenticated attacker with adjacent-network access may be able to perform remote code execution (RCE) when the router is configured with sysmode=ap. Successful exploitation results in root-level privileges and impacts confidentiality, integrity and availability of the device.

CVSS v4.0 Score: 8.5 / High

CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

Affected Products/Versions and Fixes:

Affected Product Model

Affected Version

AXE75 v1.6/v1.0

< = 1.3.2 Build 20250107

Recommendations:

We strongly recommend that users with affected devices take the following actions:

  1. Download and update to the latest firmware version to fix the vulnerability.

US: Download for Archer AXE75 | TP-Link

EN: Download for Archer AXE75 | TP-Link

Disclaimer:

If you do not take all recommended actions, this vulnerability will remain. TP-Link cannot bear any responsibility for consequences that could have been avoided by following this advisory.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >