CVE-2025-59487

Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentation fault or potentially execute arbitrary code. The vulnerability arises from improper validation of a packet field whose offset is used to determine the write location in memory. By crafting a packet with a manipulated field offset, an attacker can redirect writes to arbitrary memory locations.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_ax53_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_ax53:-:*:*:*:*:*:*:*

History

16 Mar 2026, 18:16

Type Values Removed Values Added
References
  • () https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2285 -
Summary
  • (es) Vulnerabilidad de desbordamiento de búfer basado en montículo en TP-Link Archer AX53 v1.0 (módulos tmpserver) permite a atacantes adyacentes autenticados causar un fallo de segmentación o potencialmente ejecutar código arbitrario. La vulnerabilidad surge de la validación incorrecta de un campo de paquete cuyo desplazamiento se utiliza para determinar la ubicación de escritura en la memoria. Al crear un paquete con un desplazamiento de campo manipulado, un atacante puede redirigir escrituras a ubicaciones de memoria arbitrarias. Este problema afecta a Archer AX53 v1.0: hasta 1.3.1 Build 20241120.

11 Feb 2026, 19:22

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.0
CPE cpe:2.3:o:tp-link:archer_ax53_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_ax53:-:*:*:*:*:*:*:*
First Time Tp-link archer Ax53 Firmware
Tp-link
Tp-link archer Ax53
References () https://talosintelligence.com/vulnerability_reports/ - () https://talosintelligence.com/vulnerability_reports/ - Third Party Advisory
References () https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware - () https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware - Product
References () https://www.tp-link.com/my/support/download/archer-ax53/v1/#Firmware - () https://www.tp-link.com/my/support/download/archer-ax53/v1/#Firmware - Product
References () https://www.tp-link.com/us/support/faq/4943/ - () https://www.tp-link.com/us/support/faq/4943/ - Vendor Advisory

03 Feb 2026, 19:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 19:16

Updated : 2026-03-16 18:16


NVD link : CVE-2025-59487

Mitre link : CVE-2025-59487

CVE.ORG link : CVE-2025-59487


JSON object : View

Products Affected

tp-link

  • archer_ax53
  • archer_ax53_firmware
CWE
CWE-122

Heap-based Buffer Overflow