A command injection vulnerability on AX53 v1 occurs in mscd debug functionality due to insufficient input handling, allowing log redirection to arbitrary files and concatenation of unvalidated file content into shell commands, enabling authenticated attackers to inject and execute arbitrary commands. Successful exploitation may allow execution of malicious commands and ultimately full control of the device.
History

Fri, 20 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability on AX53 v1 occurs in mscd debug functionality due to insufficient input handling, allowing log redirection to arbitrary files and concatenation of unvalidated file content into shell commands, enabling authenticated attackers to inject and execute arbitrary commands. Successful exploitation may allow execution of malicious commands and ultimately full control of the device.
Title Authenticated Command Injection in mcsd Service of TP-Link Archer AX53
Weaknesses CWE-77
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-03-20T16:31:12.808Z

Reserved: 2026-03-10T17:11:14.041Z

Link: CVE-2025-15607

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-20T17:16:40.123

Modified: 2026-03-20T17:16:40.123

Link: CVE-2025-15607

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.