User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted.

Project Subscriptions

Vendors Products
Tp-link Subscribe
Archer C50 V3 Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link archer C50 V3
Vendors & Products Tp-link
Tp-link archer C50 V3

Wed, 11 Feb 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description User-controlled input is reflected into the HTML output without proper encoding on TP-Link Archer C60 v3, allowing arbitrary JavaScript execution via a crafted URL. An attacker could run script in the device web UI context, potentially enabling credential theft, session hijacking, or unintended actions if a privileged user is targeted.
Title Reflected XSS Vulnerability on TP-Link Archer C60
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-02-11T20:58:52.270Z

Reserved: 2026-01-28T21:16:37.609Z

Link: CVE-2026-1571

cve-icon Vulnrichment

Updated: 2026-02-11T20:58:48.269Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-11T01:15:56.453

Modified: 2026-02-11T15:27:26.370

Link: CVE-2026-1571

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-11T21:46:17Z

Weaknesses