Click to skip the navigation bar

Security Advisory on Reflected XSS Vulnerability on Archer C60 (CVE-2026-1571)

Security Advisory
更新02-11-2026 00:38:28 AM Number of views for this article128

Vulnerability and Impact Description:

CVE-2026-1571:

User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted.

CVSS v4.0 Score: 5.3 / Medium

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Product Model

Affected Version

Archer C60 v3

<V3_260206

Recommendations:

We strongly recommend that users with affected devices take the following actions:

  1. Download and update to the latest firmware version to fix the vulnerabilities.

EN: https://www.tp-link.com/en/support/download/archer-c60/#Firmware

This product is not sold in the US.

Disclaimer:

If you do not take all recommended actions, this vulnerability will remain. TP-Link cannot bear any responsibility for consequences that could have been avoided by following this advisory.

更多相關文章

這篇faq是否有用?

您的反饋將幫助我們改善網站