Impact
A stack‑based buffer overflow exists in the tmpServer module of TP‑Link Archer AX53 v1.0, allowing an attacker who has authenticated access on the same network to craft a malicious configuration file. Triggering this flaw can cause a segmentation fault and potentially give the attacker arbitrary code execution on the device, enabling modification of device state, exposure of sensitive information, or further compromise of the device’s integrity.
Affected Systems
The vulnerability affects TP‑Link Archer AX53 firmware version 1.0 only. It does not impact later builds; versions up through the pre‑1.7.1 Build 20260213 are susceptible.
Risk and Exploitability
The CVSS score of 7.3 indicates a high severity, while the EPSS score of less than 1 % suggests that current exploitation attempts are rare. The vulnerability is not listed in CISA’s KEV catalog. Exploitation likely requires an authenticated attacker on the local network who can upload or modify the configuration file in the tmpServer module; the attack surface is therefore limited to users with network proximity and valid credentials.
OpenCVE Enrichment