CVE-2025-59482
Heap-based Buffer Overflow Vulnerability in TP-Link Archer AX53
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentation fault or potentially execute arbitrary code via a specially crafted network packet containing a field whose length exceeds the maximum expected value.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.
| CWE | CWE-122 |
| Vendor | tp-link systems inc. |
| Product | archer ax53 v1.0 |
| Published | Feb 3, 2026 |
| Last Updated | Mar 16, 2026 |
Stay Ahead of the Next One
Get instant alerts for tp-link systems inc. archer ax53 v1.0
Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. archer ax53 v1.0 are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
TP-Link Systems Inc. / Archer AX53 v1.0
0 โค 1.3.1 Build 20241120
References
talosintelligence.com: https://talosintelligence.com/vulnerability_reports/ tp-link.com: https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware tp-link.com: https://www.tp-link.com/my/support/download/archer-ax53/v1/#Firmware tp-link.com: https://www.tp-link.com/us/support/faq/4943/ talosintelligence.com: https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2283
Credits
Lilith >_> of Cisco Talos