Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 26 Jan 2026 18:30:00 +0000

Type Values Removed Values Added
Description Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise.
Title Authenticated Command Injection Vulnerability in Archer MR600
Weaknesses CWE-77
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-01-26T18:17:09.220Z

Reserved: 2025-12-15T21:58:57.915Z

Link: CVE-2025-14756

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-26T19:16:08.573

Modified: 2026-01-26T19:16:08.573

Link: CVE-2025-14756

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses