A hardcoded cryptographic key within the configuration mechanism on TP-Link Archer NX200, NX210, NX500 and NX600 enables decryption and re-encryption of device configuration data. An authenticated attacker may decrypt configuration files, modify them, and re-encrypt them, affecting the confidentiality and integrity of device configuration data.
Metrics
Affected Vendors & Products
References
History
Tue, 31 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link archer Nx200
Tp-link archer Nx200 Firmware Tp-link archer Nx210 Tp-link archer Nx210 Firmware Tp-link archer Nx500 Tp-link archer Nx500 Firmware Tp-link archer Nx600 Tp-link archer Nx600 Firmware |
|
| Weaknesses | CWE-798 | |
| CPEs | cpe:2.3:h:tp-link:archer_nx200:1.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx200:2.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx200:2.20:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx200:3.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx210:2.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx210:2.20:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx210:3.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx500:1.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx500:2.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx600:1.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx600:2.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_nx600:3.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_nx200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_nx210_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_nx500_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_nx600_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link archer Nx200
Tp-link archer Nx200 Firmware Tp-link archer Nx210 Tp-link archer Nx210 Firmware Tp-link archer Nx500 Tp-link archer Nx500 Firmware Tp-link archer Nx600 Tp-link archer Nx600 Firmware |
|
| Metrics |
cvssV3_1
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link archer Nx200 V1.0 Tp-link archer Nx200 V2.0 Tp-link archer Nx200 V2.20 Tp-link archer Nx200 V3.0 Tp-link archer Nx210 V2.0 V2.20 Tp-link archer Nx210 V3.0 Tp-link archer Nx500 V1.0 Tp-link archer Nx500 V2.0 Tp-link archer Nx600 V1.0 Tp-link archer Nx600 V2.0 Tp-link archer Nx600 V3.0 |
|
| Vendors & Products |
Tp-link
Tp-link archer Nx200 V1.0 Tp-link archer Nx200 V2.0 Tp-link archer Nx200 V2.20 Tp-link archer Nx200 V3.0 Tp-link archer Nx210 V2.0 V2.20 Tp-link archer Nx210 V3.0 Tp-link archer Nx500 V1.0 Tp-link archer Nx500 V2.0 Tp-link archer Nx600 V1.0 Tp-link archer Nx600 V2.0 Tp-link archer Nx600 V3.0 |
Mon, 23 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A hardcoded cryptographic key within the configuration mechanism on TP-Link Archer NX200, NX210, NX500 and NX600 enables decryption and re-encryption of device configuration data. An authenticated attacker may decrypt configuration files, modify them, and re-encrypt them, affecting the confidentiality and integrity of device configuration data. | |
| Title | Hardcoded Cryptographic Key in Configuration Encryption Mechanism on TP-Link Archer NX200, NX210, NX500 and NX600 | |
| Weaknesses | CWE-321 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published: 2026-03-23T18:02:01.109Z
Updated: 2026-03-24T03:56:03.860Z
Reserved: 2026-03-09T17:31:03.466Z
Link: CVE-2025-15605
Updated: 2026-03-23T19:07:25.221Z
Status : Analyzed
Published: 2026-03-23T18:16:24.067
Modified: 2026-03-31T19:04:37.933
Link: CVE-2025-15605
No data.
ReportizFlow