Critical severity9.8NVD Advisory· Published Mar 20, 2026· Updated Apr 2, 2026
CVE-2025-15608
CVE-2025-15608
Description
This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques.
Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.
Affected products
1- cpe:2.3:o:tp-link:archer_ax53_firmware:1.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- www.tp-link.com/us/support/faq/5025/nvdVendor Advisory
- www.tp-link.com/en/support/download/archer-ax53/v1/nvdProduct
News mentions
0No linked articles in our index yet.