Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Mar 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link archer Re605x Firmware
|
|
| Weaknesses | NVD-CWE-noinfo | |
| CPEs | cpe:2.3:h:tp-link:archer_re605x:3.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_re605x_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link archer Re605x Firmware
|
|
| Metrics |
cvssV3_1
|
Fri, 30 Jan 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 30 Jan 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link archer Re605x |
|
| Vendors & Products |
Tp-link
Tp-link archer Re605x |
Thu, 29 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 29 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability. | |
| Title | Insufficient Backup File Upload Input Validation on TP-Link Archer RE605X | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-02-26T15:04:44.878Z
Reserved: 2026-01-20T21:50:48.467Z
Link: CVE-2025-15545
Updated: 2026-01-29T17:57:36.211Z
Status : Analyzed
Published: 2026-01-29T18:16:07.533
Modified: 2026-03-09T16:55:01.720
Link: CVE-2025-15545
No data.
OpenCVE Enrichment
Updated: 2026-01-30T08:43:15Z