We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-40634

Stack-based buffer overflow in TP-Link Archer AX50



Description

Stack-based buffer overflow vulnerability in the 'conn-indicator' binary running as root on the TP-Link Archer AX50 router, in firmware versions prior to 1.0.15 build 241203 rel61480. This vulnerability allows an attacker to execute arbitrary code on the device over LAN and WAN networks.

Reserved 2025-04-16 | Published 2025-05-20 | Updated 2025-05-20 | Assigner INCIBE


CRITICAL: 9.2CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121: Stack-based Buffer Overflow

Product status

Default status
unaffected

Any version before 1.0.15 build 241203 rel61480
affected

Credits

Víctor Fresco Perales (@hacefresko) finder

References

www.incibe.es/...k-based-buffer-overflow-tp-link-archer-ax50

cve.org (CVE-2025-40634)

nvd.nist.gov (CVE-2025-40634)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-40634

Support options

Helpdesk Chat, Email, Knowledgebase