Archer C20 Firmware

3 CVEs product

Monthly

CVE-2025-15551 MEDIUM This Month

The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. [CVSS 5.6 MEDIUM]

TP-Link Tl Wr850n Firmware Tl Wr845n Firmware Archer Mr200 Firmware Archer C20 Firmware
NVD
CVSS 3.1
5.6
EPSS
0.1%
CVE-2026-0834 HIGH This Week

Unauthenticated adjacent network attackers can exploit a logic vulnerability in the TDDP module of TP-Link Archer C20 v6.0 and Archer AX53 v1.0 to execute administrative commands such as factory reset and device reboot without credentials. This allows attackers to cause loss of device configuration and service disruption on vulnerable routers. No patch is currently available for this high-severity vulnerability affecting both router models.

TP-Link Archer C20 Firmware Archer Ax53 Firmware
NVD
CVSS 3.1
8.8
EPSS
0.0%
CVE-2024-57049 CRITICAL POC THREAT Emergency

A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 48.8%.

TP-Link Authentication Bypass Archer C20 Firmware
NVD GitHub
CVSS 3.1
9.8
EPSS
48.8%
CVE-2025-15551
EPSS 0% CVSS 5.6
MEDIUM This Month

The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. [CVSS 5.6 MEDIUM]

TP-Link Tl Wr850n Firmware Tl Wr845n Firmware +2
NVD
CVE-2026-0834
EPSS 0% CVSS 8.8
HIGH This Week

Unauthenticated adjacent network attackers can exploit a logic vulnerability in the TDDP module of TP-Link Archer C20 v6.0 and Archer AX53 v1.0 to execute administrative commands such as factory reset and device reboot without credentials. This allows attackers to cause loss of device configuration and service disruption on vulnerable routers. No patch is currently available for this high-severity vulnerability affecting both router models.

TP-Link Archer C20 Firmware Archer Ax53 Firmware
NVD
CVE-2024-57049
EPSS 49% CVSS 9.8
CRITICAL POC THREAT Emergency

A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi. Rated critical severity (CVSS 9.8), this vulnerability is remotely exploitable, no authentication required, low attack complexity. Public exploit code available and EPSS exploitation probability 48.8%.

TP-Link Authentication Bypass Archer C20 Firmware
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy