Impact
The vulnerability is a stack-based buffer overflow in the tmpServer module of TP‑Link Archer AX53 firmware version 1.0. An authenticated adjacent attacker can supply a specially crafted configuration file that triggers a segmentation fault and possibly arbitrary code execution. Exploitation allows the attacker to modify device state, exfiltrate sensitive data, or further compromise the device.
Affected Systems
TP‑Link Systems Inc. Archer AX53 routers running firmware version 1.0, and any build prior to 1.7.1 Build 20260213.
Risk and Exploitability
The CVSS score of 7.3 indicates a high severity risk. The EPSS score is not available, and the vulnerability is not listed in CISA's KEV catalog. The attack requires authenticated adjacent access, implying that an attacker who can log into the device or is connected to the same local network may exploit it. If successful, the exploitation could lead to remote code execution with the privileges of the device management account.
OpenCVE Enrichment