Home

Description

A command injection vulnerability was identified in the web module of Archer AXE75 v1.6/v1.0 router. An authenticated attacker with adjacent-network access may be able to perform remote code execution (RCE) when the router is configured with sysmode=ap. Successful exploitation results in root-level privileges and impacts confidentiality, integrity and availability of the device. This issue affects Archer AXE75 v1.6/v1.0: through 1.3.2 Build 20250107.

PUBLISHED Reserved 2026-02-06 | Published 2026-03-09 | Updated 2026-03-09 | Assigner TPLink




HIGH: 8.5CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

Any version
affected

References

www.tp-link.com/us/support/download/archer-axe75/v1.60/ patch

www.tp-link.com/us/support/download/archer-axe75/v1/ patch

www.tp-link.com/en/support/download/archer-axe75/v1/ patch

www.tp-link.com/us/support/faq/5005/ vendor-advisory

cve.org (CVE-2025-15568)

nvd.nist.gov (CVE-2025-15568)

Download JSON