Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
New Framework Connects APT Campaigns Across All Layers
May 5, 2026
WhatsApp Flaw Uses Instagram Reels for Malicious URL Execution
May 5, 2026
Instagram Ending Encrypted Direct Messages Encryption
May 5, 2026
Home/CyberSecurity News/TP-Link Archer Vulnerability Allows Full Router Control
CyberSecurity News

TP-Link Archer Vulnerability Allows Full Router Control

A critical command injection vulnerability in the Archer MR600 v5 router has prompted the release of a security advisory. The flaw, tracked as CVE-2025-14756, enables authenticated attackers to...

Sarah simpson
Sarah simpson
January 28, 2026 2 Min Read
0 0

A critical command injection vulnerability in the Archer MR600 v5 router has prompted the release of a security advisory.

The flaw, tracked as CVE-2025-14756, enables authenticated attackers to execute arbitrary system commands through the device’s admin interface, potentially leading to complete router compromise.

The vulnerability exists in the admin interface component of the Archer MR600 v5 firmware. Attackers with authentication credentials can inject system commands via crafted input submitted through the browser developer console.

Although the vulnerability imposes a limited character-length restriction on injected commands.

The flaw still allows attackers to execute malicious instructions that can disrupt services or gain complete control of the affected device.

CVE ID CVSS Score Affected Product Affected Versions
CVE-2025-14756 8.5 Archer MR600 v5 <1.1.0, 0.9.1, v0001.0 Build 250930 Rel.63611n

The vulnerability has been assigned a CVSS v4.0 score of 8.5, indicating a high-severity risk.

The CVSS vector (CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA: N) indicates that the attack requires adjacent network access and high privilege levels.

But poses significant risks to the confidentiality, integrity, and availability of the router’s functions.

The vulnerability impacts explicitly the Archer MR600 v5 with firmware versions earlier than v0001.0 Build 250930 Rel.63611n (version 0.9.1 and below).

TP-Link has not released this product in the United States, limiting its exposure there. However, users in other markets with affected devices face potential security risks.

Mitigations

TP-Link strongly recommends users immediately download and install the latest firmware version to address this vulnerability.

The updated firmware patches the command injection flaw and restores security integrity.

Users can access firmware updates through TP-Link’s official support portal: English: Archer MR600 Firmware Download, Japanese: Archer MR600 Firmware Support Page.

This vulnerability highlights the importance of securing administrative interfaces on network devices.

Authenticated command injection flaws can serve as stepping stones for lateral movement within networks, especially in enterprise environments where routers act as critical infrastructure components.

Organizations managing TP-Link Archer devices should prioritize firmware updates and implement network segmentation to restrict administrative access.

Additionally, monitoring for suspicious command execution patterns on affected routers can help detect exploitation attempts before they cause damage.

TP-Link emphasizes that failure to apply the recommended security updates leaves systems vulnerable to exploitation.

The vendor cannot be held responsible for security incidents resulting from neglecting to implement these critical patches.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

Threat Actors Use Enterprise Email Threads for Phishing Links

Next Post

Critical Gemini MCP Tool 0-Day Allows Remote Vulnerability Attackers

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
pnpm 11 Turns On Minimum Release Age by Default to Reduce npm
May 5, 2026
Microsoft Edge Vulnerability: Passwords in Cleartext Memory
May 5, 2026
Apache HTTP Server RCE Exposes Millions of Servers
May 5, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us