🔐 CVE Alert

CVE-2025-15608

UNKNOWN 0.0

Buffer Overflow in Network Probe Handling Function of TP-Link Archer AX53

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
14th

This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques. Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.

CWE CWE-121
Vendor tp-link systems inc.
Product ax53 v1
Published Mar 20, 2026
Last Updated Mar 23, 2026
Stay Ahead of the Next One

Get instant alerts for tp-link systems inc. ax53 v1

Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. ax53 v1 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

TP-Link Systems Inc. / AX53 v1
0 < 251029

References

NVD ↗ CVE.org ↗ EPSS Data ↗
tp-link.com: https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware tp-link.com: https://www.tp-link.com/us/support/faq/5025/

Credits

samuzora