The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.
History

Thu, 12 Feb 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link archer C20 Firmware
Tp-link archer Mr200 Firmware
Tp-link tl-wr845n Firmware
Tp-link tl-wr850n Firmware
CPEs cpe:2.3:h:tp-link:archer_c20:6:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_mr200:5.20:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr845n:4:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tl-wr850n:3:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_c20_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_mr200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr845n_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tl-wr850n_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link archer C20 Firmware
Tp-link archer Mr200 Firmware
Tp-link tl-wr845n Firmware
Tp-link tl-wr850n Firmware
Metrics cvssV3_1

{'score': 5.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}


Fri, 06 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link archer C20
Tp-link archer Mr200
Tp-link tl-wr845n
Tp-link tl-wr850n
Vendors & Products Tp-link
Tp-link archer C20
Tp-link archer Mr200
Tp-link tl-wr845n
Tp-link tl-wr850n

Thu, 05 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 05 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
Description The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.
Title LAN Code Execution on TP-Link Archer MR200, Archer C20, TL-WR850N and TL-WR845N
Weaknesses CWE-95
References
Metrics cvssV4_0

{'score': 5.9, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published: 2026-02-05T17:22:55.600Z

Updated: 2026-02-05T20:31:56.005Z

Reserved: 2026-01-29T23:07:58.401Z

Link: CVE-2025-15551

cve-icon Vulnrichment

Updated: 2026-02-05T20:29:34.635Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-05T18:16:09.593

Modified: 2026-02-12T16:24:44.087

Link: CVE-2025-15551

cve-icon Redhat

No data.