CVE-2025-62501
Severity CVSS v4.0:
HIGH
Type:
Unavailable / Other
Publication date:
03/02/2026
Last modified:
16/03/2026
Description
SSH Hostkey misconfiguration vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows attackers to obtain device credentials through a specially crafted man‑in‑the‑middle (MITM) attack. This could enable unauthorized access if captured credentials are reused.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.
Impact
Base Score 4.0
7.00
Severity 4.0
HIGH
Base Score 3.x
8.10
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:tp-link:archer_ax53_firmware:1.0:*:*:*:*:*:*:* | ||
| cpe:2.3:h:tp-link:archer_ax53:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://talosintelligence.com/vulnerability_reports/
- https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware
- https://www.tp-link.com/my/support/download/archer-ax53/v1/#Firmware
- https://www.tp-link.com/us/support/faq/4943/
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2291



