High severity8.0NVD Advisory· Published Mar 9, 2026· Updated May 6, 2026
CVE-2025-15568
CVE-2025-15568
Description
A command injection vulnerability was identified in the web module of Archer AXE75 v1.6/v1.0 router. An authenticated attacker with adjacent-network access may be able to perform remote code execution (RCE) when the router is configured with sysmode=ap. Successful exploitation results in root-level privileges and impacts confidentiality, integrity and availability of the device.
This issue affects Archer AXE75 v1.6/v1.0: through 1.3.2 Build 20250107.
Affected products
4cpe:2.3:o:tp-link:archer_axe75_firmware:*:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:o:tp-link:archer_axe75_firmware:*:*:*:*:*:*:*:*range: <1.3.2
- cpe:2.3:o:tp-link:archer_axe75_firmware:1.3.2:-:*:*:*:*:*:*
- cpe:2.3:o:tp-link:archer_axe75_firmware:1.3.2:build_20250107:*:*:*:*:*:*
- TP-Link Systems Inc./Archer AXE75 v1.6/v1.0v5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.