Vulnerability Description
Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn modules) allows an authenticated adjacent attacker to delete arbitrary server file, leading to possible loss of critical system files and service interruption or degraded functionality.This issue affects Archer AXE75 v1.6: ≤ build 20250107.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Archer Axe75 Firmware | <= 1.3.2 |
| Tp-Link | Archer Axe75 | 1.6 |
Related Weaknesses (CWE)
References
- https://github.com/PaloAltoNetworks/u42-vulnerability-disclosures/tree/master/20Third Party Advisory
- https://www.tp-link.com/en/support/download/archer-axe75/v1/#FirmwareProduct
- https://www.tp-link.com/jp/support/download/archer-axe75/v1/#FirmwareProduct
- https://www.tp-link.com/phppage/preview.php?url=https://www.tp-link.com/en/suppoVendor Advisory
- https://www.tp-link.com/us/support/download/archer-axe75/v1/#FirmwareProduct
FAQ
What is CVE-2025-15035?
CVE-2025-15035 is a vulnerability with a CVSS score of 7.3 (HIGH). Improper Input Validation vulnerability in TP-Link Archer AXE75 v1.6 (vpn modules) allows an authenticated adjacent attacker to delete arbitrary server file, leading to possible loss of critical syste...
How severe is CVE-2025-15035?
CVE-2025-15035 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-15035?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Archer Axe75 Firmware, Tp-Link Archer Axe75.