Security Advisory on Multiple Vulnerabilities on TP-Link Archer AX53 (CVE-2025-15607 and CVE-2025-15608)
Description of Vulnerabilities and Impacts:
CVE-2025-15607: Authenticated Command Injection in mscd Service
A command injection vulnerability in AX53 v1 occurs in mscd debug functionality due to insufficient input handling, allowing log redirection to arbitrary files and concatenation of unvalidated file content into shell commands, enabling authenticated attackers to inject and execute arbitrary commands.
Successful exploitation may allow execution of malicious commands and ultimately full control of the device.
CVSS v4.0 Score: 7.3/ High
CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
CVE-2025-15608: Buffer Overflow in Network Probe Handling Function
This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques.
Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.
CVSS v4.0 Score: 7.7 / High
CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
Affected Products/Versions and Fixes:
|
Affected Product |
Affected Version |
|
Archer AX53 v1 |
< 251029 |
Recommendations:
We strongly recommend that users with affected devices take the following actions:
- Download and update to the latest firmware version to fix the vulnerabilities.
EN: Download for Archer AX53 | TP-Link
Note: AX53 is not sold in the US.
Disclaimer:
If you do not take all recommended actions, this vulnerability will remain. TP-Link cannot bear any responsibility for consequences that could have been avoided by following this advisory.
Is this faq useful?
Your feedback helps improve this site.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.