VYPR
High severity8.0NVD Advisory· Published Mar 9, 2026· Updated May 6, 2026

CVE-2025-15568

CVE-2025-15568

Description

A command injection vulnerability was identified in the web module of Archer AXE75 v1.6/v1.0 router. An authenticated attacker with adjacent-network access may be able to perform remote code execution (RCE) when the router is configured with sysmode=ap. Successful exploitation results in root-level privileges and impacts confidentiality, integrity and availability of the device.

This issue affects Archer AXE75 v1.6/v1.0: through 1.3.2 Build 20250107.

Affected products

4
  • cpe:2.3:o:tp-link:archer_axe75_firmware:*:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:tp-link:archer_axe75_firmware:*:*:*:*:*:*:*:*range: <1.3.2
    • cpe:2.3:o:tp-link:archer_axe75_firmware:1.3.2:-:*:*:*:*:*:*
    • cpe:2.3:o:tp-link:archer_axe75_firmware:1.3.2:build_20250107:*:*:*:*:*:*
  • TP-Link Systems Inc./Archer AXE75 v1.6/v1.0v5
    Range: 0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.