TP-Link threat watch

TP-Link CVE coverage for routers, Omada gateways, cameras, smart devices, and small-business network equipment.

Vendor watch hub

What this page covers

The TP-Linkwatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent TP-Link activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

15

Active

6

Featured

6

Unique CVEs

15

Most recent entry

Apr 8, 2026, 2:25 PM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent TP-Link watch items

Showing the 15 most recent items, newest first. Each row links to the official advisory.

15 rows · sorted newest first

Operations view

archer ax53 firmware vulnerability (CVE-2026-30818)

HIGH
watchNVDCVE-2026-30818

An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute arbitrary code when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow the attacker to modify device configuration, access sensitive information, or further compromise system integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213.

Apr 8, 2026, 2:25 PMOfficial source

archer ax53 firmware vulnerability (CVE-2026-30815)

HIGH
watchNVDCVE-2026-30815

An OS command injection vulnerability in the OpenVPN module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute system commands when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow modification of configuration files, disclosure of sensitive information, or further compromise of device integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213.

Apr 8, 2026, 2:25 PMOfficial source

archer ax53 firmware vulnerability (CVE-2026-30814)

HIGH
watchNVDCVE-2026-30814

A stack-based buffer overflow in the tmpServer module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to trigger a segmentation fault and potentially execute arbitrary code via a specially crafted configuration file. Successful exploitation may cause a crash and could allow arbitrary code execution, enabling modification of device state, exposure of sensitive data, or further compromise of device integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213.

Apr 8, 2026, 2:25 PMOfficial source

archer ax53 firmware vulnerability (CVE-2025-15608)

HIGH
watchNVDCVE-2025-15608

This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques. Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.

Mar 20, 2026, 12:16 PMOfficial source

archer ax53 firmware vulnerability (CVE-2025-15607)

HIGH
watchNVDCVE-2025-15607

A command injection vulnerability on AX53 v1 occurs in mscd debug functionality due to insufficient input handling, allowing log redirection to arbitrary files and concatenation of unvalidated file content into shell commands, enabling authenticated attackers to inject and execute arbitrary commands. Successful exploitation may allow execution of malicious commands and ultimately full control of the device.

Mar 20, 2026, 12:16 PMOfficial source

omada sg2005p-pd firmware vulnerability (CVE-2026-1668)

HIGH
watchNVDCVE-2026-1668

The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests. Under specific conditions, this flaw may result in unintended command execution.<br>An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure. Successful exploitation may allow remote code execution or denial-of-service.

Mar 13, 2026, 2:53 PMOfficial source

tapo c220 firmware vulnerability (CVE-2026-0919)

HIGH
watchNVDCVE-2026-0919

The HTTP parser of Tapo C210 v3, C220 v1 and C520WS v2 cameras improperly handles requests containing an excessively long URL path. An invalid‑URL error path continues into cleanup code that assumes allocated buffers exist, leading to a crash and service restart. An unauthenticated attacker can force repeated service crashes or device reboots, causing denial of service.

Jan 27, 2026, 12:15 PMOfficial source

tapo c220 firmware vulnerability (CVE-2026-0918)

HIGH
watchNVDCVE-2026-0918

The Tapo C100 v5, C220 v1 and C520WS v2 cameras’ HTTP service does not safely handle POST requests containing an excessively large Content-Length header. The resulting failed memory allocation triggers a NULL pointer dereference, causing the main service process to crash. An unauthenticated attacker can repeatedly crash the service, causing temporary denial of service. The device restarts automatically, and repeated requests can keep it unavailable.

Jan 27, 2026, 12:15 PMOfficial source

archer ax53 firmware vulnerability (CVE-2026-0834)

HIGH
watchNVDCVE-2026-0834

Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability. This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366

Jan 21, 2026, 12:16 PMOfficial source

TP-Link Archer C7(EU) and TL-WR841N/ND(MS) OS Command Injection Vulnerability

critical
activeCISA KEVCVE-2025-9377

TP-Link Archer C7(EU) and TL-WR841N/ND(MS) contain an OS command injection vulnerability that exists in the Parental Control page. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Sep 2, 2025, 7:00 PMOfficial source

TP-Link TL-WR841N Authentication Bypass by Spoofing Vulnerability

critical
activeCISA KEVCVE-2023-50224

TP-Link TL-WR841N contains an authentication bypass by spoofing vulnerability within the httpd service, which listens on TCP port 80 by default, leading to the disclose of stored credentials. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Sep 2, 2025, 7:00 PMOfficial source

TP-link TL-WA855RE Missing Authentication for Critical Function Vulnerability

critical
activeCISA KEVCVE-2020-24363

TP-link TL-WA855RE contains a missing authentication for critical function vulnerability. This vulnerability could allow an unauthenticated attacker (on the same network) to submit a TDDP_RESET POST request for a factory reset and reboot. The attacker can then obtain incorrect access control by setting a new administrative password. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Sep 1, 2025, 7:00 PMOfficial source

TP-Link Multiple Routers Command Injection Vulnerability

critical
activeCISA KEVCVE-2023-33538

TP-Link TL-WR940N V2/V4, TL-WR841N V8/V10, and TL-WR740N V1/V2 contain a command injection vulnerability via the component /userRpm/WlanNetworkRpm. The impacted products could be end-of-life (EoL) and/or end-of-service (EoS). Users should discontinue product utilization.

Jun 15, 2025, 7:00 PMOfficial source

TP-Link Archer AX-21 Command Injection Vulnerability

critical
activeCISA KEVCVE-2023-1389

TP-Link Archer AX-21 contains a command injection vulnerability that allows for remote code execution.

Apr 30, 2023, 7:00 PMOfficial source

tl-wr741nd firmware vulnerability (CVE-2015-3035)

HIGH
activeCISA KEVCVE-2015-3035

Directory traversal vulnerability in TP-LINK Archer C5 (1.2) with firmware before 150317, C7 (2.0) with firmware before 150304, and C8 (1.0) with firmware before 150316, Archer C9 (1.0), TL-WDR3500 (1.0), TL-WDR3600 (1.0), and TL-WDR4300 (1.0) with firmware before 150302, TL-WR740N (5.0) and TL-WR741ND (5.0) with firmware before 150312, and TL-WR841N (9.0), TL-WR841N (10.0), TL-WR841ND (9.0), and TL-WR841ND (10.0) with firmware before 150310 allows remote attackers to read arbitrary files via a .. (dot dot) in the PATH_INFO to login/.

Apr 21, 2015, 8:59 PMOfficial source

Related vendors

Other security vendors in the radar

Vendor watch FAQ

Common questions

What is the TP-Link threat watch page?

It is the TP-Link-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the TP-Link watch page?

Use it to confirm whether current TP-Link issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to TP-Link security issues?

Yes. ITECS can help map TP-Link advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.