Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 31 Jan 2026 08:30:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 30 Jan 2026 18:00:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link archer Re605x |
|
| Vendors & Products |
Tp-link
Tp-link archer Re605x |
Fri, 30 Jan 2026 03:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 30 Jan 2026 02:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability. | |
| Title | Insufficient Backup File Upload Input Validation on TP-Link Archer RE605X | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-01-30T23:15:46.194Z
Reserved: 2026-01-20T21:50:48.467Z
Link: CVE-2025-15545
Updated: 2026-01-29T17:57:36.211Z
Status : Awaiting Analysis
Published: 2026-01-29T18:16:07.533
Modified: 2026-01-31T00:15:51.647
Link: CVE-2025-15545
No data.
OpenCVE Enrichment
Updated: 2026-01-30T17:43:15Z