Description
A stack-based buffer overflow in the tmpServer module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to trigger a segmentation fault and potentially execute arbitrary code via a specially crafted configuration file. Successful exploitation may cause a crash and could allow arbitrary code execution, enabling modification of device state, exposure of sensitive data, or further compromise of device integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Problem types
CWE-121 Stack-based buffer overflow
Product status
Any version before 1.7.1 Build 20260213
Credits
Lilith >_> of Cisco Talos
References
www.tp-link.com/my/support/download/archer-ax53/v1/
www.tp-link.com/en/support/download/archer-ax53/v1/
talosintelligence.com/vulnerability_reports/
www.tp-link.com/us/support/faq/5055/