SB20260325136 - Two vulnerabilities in TP-Link Archer AX53



SB20260325136 - Two vulnerabilities in TP-Link Archer AX53

Published: March 25, 2026

Security Bulletin ID SB20260325136
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Command injection (CVE-ID: CVE-2025-15607)

The vulnerability allows a remote user to execute arbitrary code.

The vulnerability exists due to improper input validation in the mscd service when handling debug functionality. A remote user can send a specially crafted request to execute arbitrary commands.

Authentication is required to exploit this vulnerability.


2) Stack-based buffer overflow (CVE-ID: CVE-2025-15608)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation in the network probe handling function when processing incoming probe requests. A remote attacker can send a specially crafted packet to trigger a buffer overflow and potentially execute arbitrary code.

Exploitation may require complex heap-spray techniques and could result in denial of service even if code execution is not achieved.


Remediation

Install update from vendor's website.