Vulnerability Details CVE-2025-15551
The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 9.6%
CVSS Severity
CVSS v3 Score 5.6
Products affected by CVE-2025-15551
-
cpe:2.3:h:tp-link:archer_c20:6
-
cpe:2.3:h:tp-link:archer_mr200:5.20
-
cpe:2.3:h:tp-link:tl-wr845n:4
-
cpe:2.3:h:tp-link:tl-wr850n:3
-
cpe:2.3:o:tp-link:archer_c20_firmware:150707
-
cpe:2.3:o:tp-link:archer_c20_firmware:230616
-
cpe:2.3:o:tp-link:archer_c20_firmware:6.6_230412
-
cpe:2.3:o:tp-link:archer_mr200_firmware:*
-
cpe:2.3:o:tp-link:tl-wr845n_firmware:190219
-
cpe:2.3:o:tp-link:tl-wr845n_firmware:200909
-
cpe:2.3:o:tp-link:tl-wr845n_firmware:201214
-
cpe:2.3:o:tp-link:tl-wr850n_firmware:*