The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 05 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.
Title LAN Code Execution on TP-Link Archer MR200, Archer C20, TL-WR850N and TL-WR845N
Weaknesses CWE-95
References
Metrics cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-02-05T20:31:56.005Z

Reserved: 2026-01-29T23:07:58.401Z

Link: CVE-2025-15551

cve-icon Vulnrichment

Updated: 2026-02-05T20:29:34.635Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-05T18:16:09.593

Modified: 2026-02-05T20:47:37.777

Link: CVE-2025-15551

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses