Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link ax53 V1 |
|
| Vendors & Products |
Tp-link
Tp-link ax53 V1 |
Fri, 20 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques. Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device. | |
| Title | Buffer Overflow in Network Probe Handling Function of TP-Link Archer AX53 | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-03-23T13:01:23.572Z
Reserved: 2026-03-10T17:11:18.919Z
Link: CVE-2025-15608
Updated: 2026-03-23T13:01:19.826Z
Status : Awaiting Analysis
Published: 2026-03-20T17:16:41.220
Modified: 2026-03-24T15:54:09.400
Link: CVE-2025-15608
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:53:12Z