Impact
The flaw stems from insufficient validation of network probe packets processed by the Archer AX53 v1 firmware. An attacker may send a crafted probe that overflows a stack buffer within the probe handling function, causing a crash. In specific scenarios, the overflow can be leveraged with complex heap-spray techniques, potentially yielding remote code execution and full device compromise while also fostering repeated service disruptions.
Affected Systems
TP‑Link Archer AX53 router, version 1.0 (v1), is the only product listed as affected.
Risk and Exploitability
The CVSS score of 7.7 indicates a high severity, and an EPSS score of less than 1% suggests a low likelihood of widespread exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. It is inferred that an adversary could exploit the flaw by sending a crafted network probe from an external network to the router, triggering the buffer overflow and potentially executing code on the device.
OpenCVE Enrichment