Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| TP-Link Systems Inc. | Archer RE605X | 0 ~ (EU)_V3_20260113, (US)_V3_20260126 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Proof of Concept for CVE-2025-15545 | https://github.com/Xernary/CVE-2025-15545 | POC Details |
No public POC found.
Login to generate AI POC| CVE-2026-1457 | Authenticated RCE Vulnerability Due to Buffer Overflow on TP-Link VIGI C385 | |
| CVE-2025-15548 | Missing Application-Layer Encryption in Web Interface Endpoints on TP-Link VX800v | |
| CVE-2025-15543 | Read-Only Root Access via USB Storage Device in TP-Link VX800v | |
| CVE-2025-15541 | Access to System Files via SFTP on TP-Link VX800v | |
| CVE-2025-15542 | Denial of Service (DoS) of VoIP Communication on TP-Link VX800v | |
| CVE-2025-13399 | Insecure Encryption in Communication with the Web Interface on TP-Link VX800v |
No comments yet