8.5

CVE-2025-15519

Medienbericht

Command Injection in Modem Management CLI on TP-Link Archer NX200, NX210, NX500 and NX600

Improper input handling in a modem-management administrative CLI command on TP-Link Archer NX200, NX210, NX500 and NX600 allows crafted input to be executed as part of an operating system command. An authenticated attacker with administrative privileges may execute arbitrary commands on the operating system, impacting the confidentiality, integrity, and availability of the device.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Tp-linkArcher Nx600 Firmware Version < 1.3.0
   Tp-linkArcher Nx600 Version3.0
Tp-linkArcher Nx500 Firmware Version < 1.5.0
   Tp-linkArcher Nx500 Version2.0
Tp-linkArcher Nx210 Firmware Version < 1.3.0
   Tp-linkArcher Nx210 Version3.0
Tp-linkArcher Nx200 Firmware Version < 1.3.0
   Tp-linkArcher Nx200 Version3.0
Tp-linkArcher Nx600 Firmware Version < 1.3.0
   Tp-linkArcher Nx600 Version2.0
Tp-linkArcher Nx600 Firmware Version < 1.4.0
   Tp-linkArcher Nx600 Version1.0
Tp-linkArcher Nx500 Firmware Version < 1.3.0
   Tp-linkArcher Nx500 Version1.0
Tp-linkArcher Nx210 Firmware Version < 1.3.0
   Tp-linkArcher Nx210 Version2.0
   Tp-linkArcher Nx210 Version2.20
Tp-linkArcher Nx200 Firmware Version < 1.3.0
   Tp-linkArcher Nx200 Version2.0
   Tp-linkArcher Nx200 Version2.20
Tp-linkArcher Nx200 Firmware Version < 1.8.0
   Tp-linkArcher Nx200 Version1.0
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.08% 0.241
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
f23511db-6c3e-4e32-a477-6aa17d310630 8.5 0 0
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.