Several serious security vulnerabilities have been found in many routers from the hugely popular Chinese company TP-Link.
The vulnerabilities have been found in these models, widely used even in Finland:
The most serious of the discovered vulnerabilities is CVE-2025-15517, which allows for the hijacking of router control without any user interaction. The vulnerability has a risk level of 8.6/10 and is related to a bug in the router's browser-based management panel, which uses an http connection, allowing login to be bypassed and access to the router's administration views.
Other discovered vulnerabilities also have a risk level of 8.5/10: CVE-2025-15518, CVE-2025-15519, and CVE-2025-15605.
The company has released an update for all of these, in the form of new firmware. Unfortunately, routers typically do not update themselves, so every router owner should handle the update manually.
- TP-Link Archer NX200
- TP-Link Archer NX210
- TP-Link Archer NX500
- TP-Link Archer NX600
The most serious of the discovered vulnerabilities is CVE-2025-15517, which allows for the hijacking of router control without any user interaction. The vulnerability has a risk level of 8.6/10 and is related to a bug in the router's browser-based management panel, which uses an http connection, allowing login to be bypassed and access to the router's administration views.
Other discovered vulnerabilities also have a risk level of 8.5/10: CVE-2025-15518, CVE-2025-15519, and CVE-2025-15605.
The company has released an update for all of these, in the form of new firmware. Unfortunately, routers typically do not update themselves, so every router owner should handle the update manually.








