Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-15545— Insufficient Backup File Upload Input Validation on TP-Link Archer RE605X

EPSS 0.04% · P13
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-15545

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Insufficient Backup File Upload Input Validation on TP-Link Archer RE605X
Source: NVD (National Vulnerability Database)
Vulnerability Description
The backup restore function does not properly validate unexpected or unrecognized tags within the backup file. When such a crafted file is restored, the injected tag is interpreted by a shell, allowing execution of arbitrary commands with root privileges. Successful exploitation allows the attacker to gain root-level command execution, compromising confidentiality, integrity and availability.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
TP-Link Archer RE605X 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TP-Link Archer RE605X是中国普联(TP-Link)公司的一个无线信号放大器。 TP-Link Archer RE605X存在安全漏洞,该漏洞源于备份还原功能未正确验证备份文件中的意外或无法识别标签,可能导致执行任意命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
TP-Link Systems Inc.Archer RE605X 0 ~ (EU)_V3_20260113, (US)_V3_20260126 -

II. Public POCs for CVE-2025-15545

#POC DescriptionSource LinkShenlong Link
1Proof of Concept for CVE-2025-15545https://github.com/Xernary/CVE-2025-15545POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-15545

登录查看更多情报信息。

Same Patch Batch · TP-Link Systems Inc. · 2026-01-29 · 7 CVEs total

CVE-2026-1457Authenticated RCE Vulnerability Due to Buffer Overflow on TP-Link VIGI C385
CVE-2025-15548Missing Application-Layer Encryption in Web Interface Endpoints on TP-Link VX800v
CVE-2025-15543Read-Only Root Access via USB Storage Device in TP-Link VX800v
CVE-2025-15541Access to System Files via SFTP on TP-Link VX800v
CVE-2025-15542Denial of Service (DoS) of VoIP Communication on TP-Link VX800v
CVE-2025-13399Insecure Encryption in Communication with the Web Interface on TP-Link VX800v

IV. Related Vulnerabilities

V. Comments for CVE-2025-15545

No comments yet


Leave a comment