HomeTechnologyCERT-In issues high-severity alert for these routers, urges immediate updates

CERT-In issues high-severity alert for these routers, urges immediate updates

CERT-In has flagged multiple vulnerabilities in TP-Link Archer routers that could allow file deletion and service disruption, advising users to update firmware to reduce security risks.

January 20, 2026 / 15:43 IST
Story continues below Advertisement
Router
Router
Snapshot AI
  • CERT-In warns of high-severity flaws in TP-Link Archer BE400 and AXE75 routers
  • Attackers could delete files or cause denial-of-service on affected devices
  • Users urged to update firmware and follow security best practices

India’s Computer Emergency Response Team (CERT-In) has issued a high-severity vulnerability note warning users of multiple security flaws affecting TP-Link Archer series routers. The advisory, identified as CIVN-2026-0034, highlights risks that could allow attackers to delete files or trigger denial-of-service (DoS) conditions on impacted devices.

Systems affected
According to CERT-In, the vulnerabilities impact specific versions of TP-Link Archer routers. These include the TP-Link Archer BE400 V1 running firmware version 1.1.0 build 20250710 rel.14914 and earlier, and the TP-Link Archer AXE75 v1.6 running firmware versions prior to build 20250107. Users operating these versions are advised to take corrective action without delay.

Story continues below Advertisement

Nature of the vulnerability
The advisory states that the issues stem from improper input validation and incorrect handling of pointer references within the 802.11 wireless module processing code. If successfully exploited, these flaws could allow a remote attacker to perform arbitrary file deletion on the router. In addition, the attacker could cause a denial-of-service condition, potentially disrupting internet connectivity for users relying on the affected devices.
CERT-In noted that TP-Link Archer routers are commonly used in homes and organisations for wireless internet access across 2.4GHz, 5GHz, and 6GHz bands. As a result, exploitation could impact both individual users and enterprise environments.

Risk and impact assessment
CERT-In has classified the vulnerability as high severity. The risk assessment points to a high likelihood of service interruption and unauthorised access. From an impact perspective, the flaws could affect the confidentiality, integrity, and availability of the system, depending on how the vulnerability is exploited.