The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability.
History

Mon, 09 Mar 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link archer Re605x Firmware
Weaknesses NVD-CWE-noinfo
CPEs cpe:2.3:h:tp-link:archer_re605x:3.0:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_re605x_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link archer Re605x Firmware
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Fri, 30 Jan 2026 23:30:00 +0000

Type Values Removed Values Added
References

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link archer Re605x
Vendors & Products Tp-link
Tp-link archer Re605x

Thu, 29 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 29 Jan 2026 17:45:00 +0000

Type Values Removed Values Added
Description The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability.
Title Insufficient Backup File Upload Input Validation on TP-Link Archer RE605X
Weaknesses CWE-20
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published: 2026-01-29T17:31:10.117Z

Updated: 2026-02-26T15:04:44.878Z

Reserved: 2026-01-20T21:50:48.467Z

Link: CVE-2025-15545

cve-icon Vulnrichment

Updated: 2026-01-29T17:57:36.211Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-29T18:16:07.533

Modified: 2026-03-09T16:55:01.720

Link: CVE-2025-15545

cve-icon Redhat

No data.