Click to skip the navigation bar

Security Advisory on Multiple Vulnerabilities on TP-Link Archer AX53 (CVE-2025-15607 and CVE-2025-15608)

Security Advisory
Updated 03-20-2026 16:29:54 PM Number of views for this article114

Description of Vulnerabilities and Impacts:

CVE-2025-15607: Authenticated Command Injection in mscd Service

A command injection vulnerability in AX53 v1 occurs in mscd debug functionality due to insufficient input handling, allowing log redirection to arbitrary files and concatenation of unvalidated file content into shell commands, enabling authenticated attackers to inject and execute arbitrary commands.

Successful exploitation may allow execution of malicious commands and ultimately full control of the device.

CVSS v4.0 Score: 7.3/ High

CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

CVE-2025-15608: Buffer Overflow in Network Probe Handling Function

This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques.

Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.

CVSS v4.0 Score: 7.7 / High

CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

Affected Products/Versions and Fixes:

Affected Product

Affected Version

Archer AX53 v1

< 251029

Recommendations:

We strongly recommend that users with affected devices take the following actions:

  1. Download and update to the latest firmware version to fix the vulnerabilities.

EN: Download for Archer AX53 | TP-Link

Note: AX53 is not sold in the US.

Disclaimer:

If you do not take all recommended actions, this vulnerability will remain. TP-Link cannot bear any responsibility for consequences that could have been avoided by following this advisory.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >