Vulnerability Description
This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques. Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Archer Ax53 Firmware | 1.0 |
| Tp-Link | Archer Ax53 | - |
Related Weaknesses (CWE)
References
- https://www.tp-link.com/en/support/download/archer-ax53/v1/#FirmwareProduct
- https://www.tp-link.com/us/support/faq/5025/Vendor Advisory
FAQ
What is CVE-2025-15608?
CVE-2025-15608 is a vulnerability with a CVSS score of 9.8 (CRITICAL). This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the ...
How severe is CVE-2025-15608?
CVE-2025-15608 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-15608?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Archer Ax53 Firmware, Tp-Link Archer Ax53.