Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-58455: CWE-122 Heap-based Buffer Overflow in TP-Link Systems Inc. Archer AX53 v1.0

0
High
VulnerabilityCVE-2025-58455cvecve-2025-58455cwe-122
Published: Tue Feb 03 2026 (02/03/2026, 18:46:44 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer AX53 v1.0

Description

Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentation fault or potentially execute arbitrary code via a specially crafted network packet whose length exceeds the maximum expected value.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 18:27:19 UTC

Technical Analysis

CVE-2025-58455 is a heap-based buffer overflow vulnerability categorized under CWE-122, affecting TP-Link Archer AX53 v1.0 routers, specifically in the tmpserver modules. The flaw arises when the device processes a network packet whose length exceeds the maximum expected value, leading to memory corruption on the heap. An attacker with authenticated access on an adjacent network segment can exploit this by crafting a malicious packet that triggers a segmentation fault, potentially escalating to arbitrary code execution. The vulnerability affects firmware versions through 1.3.1 Build 20241120. The CVSS 4.0 score is 7.3 (high severity) with vector AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N, indicating that exploitation requires adjacent network access, high attack complexity, and high privileges, but no user interaction. The vulnerability impacts confidentiality, integrity, and availability, as arbitrary code execution could allow full control over the device. No patches or exploits are currently publicly available, but the risk remains significant due to the potential for remote code execution on widely deployed consumer and small business routers. The tmpserver module's role in device management or communication makes this vulnerability critical for network security. Organizations relying on these devices should monitor for vendor updates and consider network segmentation to reduce exposure.

Potential Impact

The impact of CVE-2025-58455 is substantial for organizations using TP-Link Archer AX53 routers, especially in environments where these devices serve as primary network gateways or are deployed in sensitive network segments. Successful exploitation can lead to denial of service via segmentation faults or full device compromise through arbitrary code execution. This could allow attackers to intercept, modify, or redirect network traffic, disrupt network availability, or use the compromised router as a foothold for further internal network attacks. Given the requirement for authenticated adjacent access, attackers may be insiders or those who have gained limited network access, increasing the risk in shared or poorly segmented networks. The vulnerability threatens confidentiality, integrity, and availability of network communications and could impact business operations, data privacy, and network reliability. Organizations with large deployments of these routers, especially in regions with high TP-Link market share, face increased risk of targeted attacks or exploitation by advanced threat actors.

Mitigation Recommendations

To mitigate CVE-2025-58455, organizations should: 1) Monitor TP-Link’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 2) Restrict administrative access to the routers to trusted personnel only and enforce strong authentication mechanisms to prevent unauthorized access. 3) Implement network segmentation to isolate router management interfaces from general user networks, limiting adjacency to trusted devices. 4) Employ network intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous packets or attempts to exploit buffer overflow conditions in the tmpserver module. 5) Disable or restrict unused services and interfaces on the router to reduce the attack surface. 6) Conduct regular security audits and vulnerability assessments on network infrastructure devices. 7) Educate network administrators about the risks of authenticated adjacent attacks and enforce strict access controls. These measures, combined with timely patching, will significantly reduce the risk posed by this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-10-20T16:12:08.413Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 698245baf9fa50a62fda11c6

Added to database: 2/3/2026, 7:00:10 PM

Last enriched: 3/16/2026, 6:27:19 PM

Last updated: 3/25/2026, 3:40:29 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses