Stack-based buffer overflow in TP-Link Archer AX50
Posted date 20/05/2025
Identificador
INCIBE-2025-0250
Importance
5 - Critical
Affected Resources
- Link Archer AX50, firmware versions prior to 1.0.15 build 241203 rel61480.
Description
INCIBE has coordinated the publication of a vulnerability of critical severity affecting the TP-Link Archer AX50 router. The vulnerability was discovered by Víctor Fresco Perales (@hacefresko).
This vulnerability has been assigned the following code, CVSS v4.0 base score, CVSS vector and vulnerability type CWE.
- CVE-2025-40634: CVSS v4.0: 9.2 | CVSS AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N | CWE-121
Solution
The vulnerability has been fixed by the TP-Link team in firmware version 1.0.15 build 241203 rel61480.
Detail
CVE-2025-40634: stack-based buffer overflow vulnerability in the 'conn-indicator' binary running as root on the TP-Link Archer AX50 router, in firmware versions prior to 1.0.15 build 241203 rel61480. This vulnerability allows an attacker to execute arbitrary code on the device over LAN and WAN networks.
References list
Etiquetas