Home

Description

The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability.

PUBLISHED Reserved 2026-01-20 | Published 2026-01-29 | Updated 2026-01-30 | Assigner TPLink




HIGH: 7.3CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

Any version before (EU)_V3_20260113, (US)_V3_20260126
affected

Credits

Nicola Giuffrida finder

References

www.tp-link.com/en/support/download/re605x/v3/ patch

www.tp-link.com/us/support/download/re605x/v3/ patch

www.tp-link.com/us/support/faq/4929/ vendor-advisory

nico-security.com/posts/cve-2025-15545

cve.org (CVE-2025-15545)

nvd.nist.gov (CVE-2025-15545)

Download JSON