Description
This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques.

Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.
Published: 2026-03-20
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Immediately
AI Analysis

Impact

The flaw stems from insufficient validation of network probe packets processed by the Archer AX53 v1 firmware. An attacker may send a crafted probe that overflows a stack buffer within the probe handling function, causing a crash. In specific scenarios, the overflow can be leveraged with complex heap-spray techniques, potentially yielding remote code execution and full device compromise while also fostering repeated service disruptions.

Affected Systems

TP‑Link Archer AX53 router, version 1.0 (v1), is the only product listed as affected.

Risk and Exploitability

The CVSS score of 7.7 indicates a high severity, and an EPSS score of less than 1% suggests a low likelihood of widespread exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. It is inferred that an adversary could exploit the flaw by sending a crafted network probe from an external network to the router, triggering the buffer overflow and potentially executing code on the device.

Generated by OpenCVE AI on April 3, 2026 at 00:52 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the router firmware to the latest version released by TP‑Link for AX53 v1.
  • If a firmware update is not available immediately, block or drop network probe traffic using firewall rules or access control lists.
  • Monitor system logs for repeated service crashes or abnormal probe packet traffic and investigate any suspicious activity.

Generated by OpenCVE AI on April 3, 2026 at 00:52 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 02 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link archer Ax53
Tp-link archer Ax53 Firmware
CPEs cpe:2.3:h:tp-link:archer_ax53:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_ax53_firmware:1.0:*:*:*:*:*:*:*
Vendors & Products Tp-link archer Ax53
Tp-link archer Ax53 Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Mon, 23 Mar 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link ax53 V1
Vendors & Products Tp-link
Tp-link ax53 V1

Fri, 20 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques. Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.
Title Buffer Overflow in Network Probe Handling Function of TP-Link Archer AX53
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


Subscriptions

Tp-link Archer Ax53 Archer Ax53 Firmware Ax53 V1
cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-03-23T13:01:23.572Z

Reserved: 2026-03-10T17:11:18.919Z

Link: CVE-2025-15608

cve-icon Vulnrichment

Updated: 2026-03-23T13:01:19.826Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-20T17:16:41.220

Modified: 2026-04-02T20:53:59.013

Link: CVE-2025-15608

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T09:39:18Z

Weaknesses