Impact
A missing authentication check in the TP‑Link Archer NX series HTTP server creates an authorization bypass (CWE‑306). This flaw allows unauthenticated users to reach CGI endpoints intended for privileged management, enabling actions such as firmware uploads and configuration changes. The resulting compromise can modify device behavior, replace firmware with malicious code, and disrupt network services, affecting confidentiality, integrity, and availability.
Affected Systems
Vulnerable models include TP‑Link Archer NX200 (v1.0 through v3.0), Archer NX210 (v2.0 through v3.0), Archer NX500 (v1.0 v2.0), and Archer NX600 (v1.0 v2.0 v3.0). All affected units expose the susceptible HTTP endpoints in their current firmware.
Risk and Exploitability
The CVSS score of 8.6 marks this as high risk. EPSS is below 1 % and the vulnerability is not listed in CISA’s KEV catalogue, indicating low current exploitation activity. Attackers can exploit it with simple HTTP requests over the local or internet‑facing interface, requiring no credentials. Successful exploitation grants full control over the device, including firmware replacement and configuration manipulation.
OpenCVE Enrichment