Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-14756
PUBLISHED
More InfoOfficial Page
Assigner-TPLink
Assigner Org ID-f23511db-6c3e-4e32-a477-6aa17d310630
View Known Exploited Vulnerability (KEV) details
Published At-26 Jan, 2026 | 18:17
Updated At-26 Feb, 2026 | 15:04
Rejected At-
▼CVE Numbering Authority (CNA)
Authenticated Command Injection Vulnerability in Archer MR600

Command injection vulnerability was found in the admin interface component of TP-Link Archer MR600 v5 firmware, allowing authenticated attackers to execute system commands with a limited character length via crafted input in the browser developer console, possibly leading to service disruption or full compromise.

Affected Products
Vendor
TP-Link Systems Inc.
Product
Archer MR600 v5.0
Platforms
  • ARM
  • Linux
Default Status
unaffected
Versions
Affected
  • From 0 before 1.1.0 0.9.1 v0001.0 Build 250930 Rel.63611n (custom)
Problem Types
TypeCWE IDDescription
CWECWE-77CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
Type: CWE
CWE ID: CWE-77
Description: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
Metrics
VersionBase scoreBase severityVector
4.08.5HIGH
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 8.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-248CAPEC-248 Command Injection
CAPEC ID: CAPEC-248
Description: CAPEC-248 Command Injection
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Chuya Hayakawa of 00One, Inc.
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.tp-link.com/jp/support/download/archer-mr600/#Firmware
patch
https://www.tp-link.com/en/support/download/archer-mr600/#Firmware
patch
https://www.tp-link.com/us/support/faq/4916/
vendor-advisory
https://jvn.jp/en/vu/JVNVU94651499/
N/A
https://jvn.jp/vu/JVNVU94651499/
N/A
Hyperlink: https://www.tp-link.com/jp/support/download/archer-mr600/#Firmware
Resource:
patch
Hyperlink: https://www.tp-link.com/en/support/download/archer-mr600/#Firmware
Resource:
patch
Hyperlink: https://www.tp-link.com/us/support/faq/4916/
Resource:
vendor-advisory
Hyperlink: https://jvn.jp/en/vu/JVNVU94651499/
Resource: N/A
Hyperlink: https://jvn.jp/vu/JVNVU94651499/
Resource: N/A
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found