This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques.
Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.
Metrics
Affected Vendors & Products
References
History
Fri, 20 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques. Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device. | |
| Title | Buffer Overflow in Network Probe Handling Function of TP-Link Archer AX53 | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-03-21T04:01:43.420Z
Reserved: 2026-03-10T17:11:18.919Z
Link: CVE-2025-15608
No data.
Status : Received
Published: 2026-03-20T17:16:41.220
Modified: 2026-03-20T17:16:41.220
Link: CVE-2025-15608
No data.
OpenCVE Enrichment
No data.