Impact
An improper input handling flaw in the wireless‑control administrative command line interface of TP‑Link Archer NX200, NX210, NX500 and NX600 series devices allows crafted input to be executed as part of an operating system command. If an attacker can authenticate as an administrator, they can run arbitrary commands on the device, potentially compromising confidentiality, integrity, and availability of the router and any devices connected to it. The flaw is classified as CWE‑78: Improper Neutralization of Special Elements used in an OS Command.
Affected Systems
The vulnerability affects all firmware variants of the TP‑Link Archer NX200, NX210, NX500 and NX600 models listed by the CNA, including versions 1.0 through 3.0. No specific unaffected versions are indicated in the data.
Risk and Exploitability
The CVSS score of 8.5 indicates a high severity, while an EPSS score of less than 1% suggests a low probability of immediate exploitation. The flaw requires authenticated administrator access and is not currently listed in the CISA KEV catalog, but once privileged access is achieved the attacker can gain full control over the device, affecting all aspects of confidentiality, integrity, and availability.
OpenCVE Enrichment