Click to skip the navigation bar

Security Advisory on Arbitrary File Deletion Vulnerability in TP-Link Archer AXE75 (CVE-2025-15035)

Security Advisory
更新01-09-2026 17:08:44 PM Number of views for this article1922

Vulnerability Description:

Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn modules) allows an authenticated adjacent attacker to delete arbitrary server file.

Impacts:

This vulnerability may lead to:

  • Loss of critical system files, compromising system integrity.
  • Service interruption or degraded functionality due to deletion of configuration or operational files.

CVSS v4.0 Score: 6.9 / Medium

CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Product Model

Related Vulnerabilities

Affected Version

Archer AXE75 v1.6

CVE-2025-15035

≤ build 20250107

Recommendation(s):

We strongly recommend that users with the affected device(s) take the following action(s):

  1. Download and update to the latest firmware version to fix these vulnerabilities:

US: https://www.tp-link.com/us/support/download/archer-axe75/v1/#Firmware

EN: https://www.tp-link.com/en/support/download/archer-axe75/v1/#Firmware

JP: Archer AXE75 のコンテンツ | TP-Link 日本

Disclaimer:

If you do not take the recommended actions stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended actions in this statement.

更多相關文章

這篇faq是否有用?

您的反饋將幫助我們改善網站