Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 20 Feb 2026 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link archer C60
Tp-link archer C60 Firmware |
|
| CPEs | cpe:2.3:h:tp-link:archer_c60:3.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_c60_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link archer C60
Tp-link archer C60 Firmware |
|
| Metrics |
cvssV3_1
|
Wed, 11 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link archer C50 V3 |
|
| Vendors & Products |
Tp-link
Tp-link archer C50 V3 |
Wed, 11 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 11 Feb 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted. | |
| Title | Reflected XSS Vulnerability on TP-Link Archer C60 | |
| Weaknesses | CWE-79 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-03-10T16:44:13.815Z
Reserved: 2026-01-28T21:16:37.609Z
Link: CVE-2026-1571
Updated: 2026-02-11T20:58:48.269Z
Status : Analyzed
Published: 2026-02-11T01:15:56.453
Modified: 2026-02-20T20:19:24.487
Link: CVE-2026-1571
No data.
OpenCVE Enrichment
Updated: 2026-04-16T17:30:25Z