Vulnerability in TP-Link Routers Allowing JavaScript Code Execution
CVE-2025-15551

5.9MEDIUM

What is CVE-2025-15551?

A vulnerability exists in certain TP-Link router models where the JavaScript function eval executes responses without validation. This flaw could be exploited through a Man-in-the-Middle (MitM) attack, allowing attackers to inject malicious JavaScript code into the router's admin web portal, potentially compromising user security and access without their awareness. It is crucial for users to apply the recommended security patches to mitigate the risks associated with this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Archer C20 v6 0 < 0.9.1 4.19 v0001.0 Build 250630 Rel.56583n

Archer MR200 v5.2 0 < 1.2.0 Build 250917 Rel.51746

TL-WR845N v4 0 < 0.9.1 3.19 Build 251031 rel33710

References

CVSS V4

Score:
5.9
Severity:
MEDIUM
Confidentiality:
High
Integrity:
Low
Availability:
Low
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Swaroop Dora, Deven Lunkad, Ashutosh Kumar, and S. Venkatesan from IoT Security Research Lab, Indian Institute of Information Technology, Allahabad
.