Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 27 Jan 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link archer Mr600
Vendors & Products Tp-link
Tp-link archer Mr600

Tue, 27 Jan 2026 02:15:00 +0000

Type Values Removed Values Added
References

Mon, 26 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 26 Jan 2026 18:30:00 +0000

Type Values Removed Values Added
Description Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise.
Title Authenticated Command Injection Vulnerability in Archer MR600
Weaknesses CWE-77
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-01-27T04:55:38.502Z

Reserved: 2025-12-15T21:58:57.915Z

Link: CVE-2025-14756

cve-icon Vulnrichment

Updated: 2026-01-26T19:08:15.836Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-26T19:16:08.573

Modified: 2026-01-27T14:59:34.073

Link: CVE-2025-14756

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-27T09:03:23Z

Weaknesses