CVE-2025-15608
Severity CVSS v4.0:
HIGH
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
20/03/2026
Last modified:
02/04/2026
Description
This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques. <br />
<br />
Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.
Impact
Base Score 4.0
7.70
Severity 4.0
HIGH
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:tp-link:archer_ax53_firmware:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:h:tp-link:archer_ax53:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



