CVE-2025-15608
Buffer Overflow in Network Probe Handling Function of TP-Link Archer AX53
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
14th
This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques. Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.
| CWE | CWE-121 |
| Vendor | tp-link systems inc. |
| Product | ax53 v1 |
| Published | Mar 20, 2026 |
| Last Updated | Mar 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for tp-link systems inc. ax53 v1
Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. ax53 v1 are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
TP-Link Systems Inc. / AX53 v1
0 < 251029
References
Credits
samuzora