Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62501: CWE-322 Key Exchange without Entity Authentication in TP-Link Systems Inc. Archer AX53 v1.0

0
High
VulnerabilityCVE-2025-62501cvecve-2025-62501cwe-322
Published: Tue Feb 03 2026 (02/03/2026, 18:52:54 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer AX53 v1.0

Description

SSH Hostkey misconfiguration vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows attackers to obtain device credentials through a specially crafted man‑in‑the‑middle (MITM) attack. This could enable unauthorized access if captured credentials are reused.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/16/2026, 18:29:07 UTC

Technical Analysis

CVE-2025-62501 identifies a critical security weakness in the TP-Link Archer AX53 v1.0 router series, specifically within the tmpserver modules responsible for SSH host key management. The vulnerability stems from improper SSH host key configuration that results in a key exchange process lacking entity authentication (classified under CWE-322). This deficiency enables an attacker positioned to intercept network traffic (man-in-the-middle) to capture device credentials during SSH sessions. Since the SSH host key is not properly authenticated, the attacker can impersonate the device or the client, facilitating credential theft. These credentials, once obtained, can be reused to gain unauthorized access to the device, potentially allowing further compromise of the network. The vulnerability requires the attacker to have access to the network path between the client and the device and some user interaction, but does not require elevated privileges on the device itself. The affected firmware versions include all up to 1.3.1 Build 20241120. Although no public exploits are known at this time and no official patches have been released, the high CVSS score of 7 reflects the significant risk posed by this vulnerability due to the potential for credential compromise and unauthorized access. The lack of entity authentication in the SSH key exchange process is a fundamental cryptographic flaw that undermines the trust model of secure communications on the device.

Potential Impact

The primary impact of CVE-2025-62501 is the compromise of device credentials through MITM attacks, which can lead to unauthorized access to the affected routers. This unauthorized access can allow attackers to manipulate network traffic, intercept sensitive data, alter device configurations, or use the compromised device as a foothold for further attacks within an organization's network. The confidentiality, integrity, and availability of network communications and connected systems are at risk. Organizations relying on TP-Link Archer AX53 routers in enterprise, SMB, or critical infrastructure environments could face significant operational disruptions and data breaches if exploited. Credential reuse exacerbates the risk by enabling persistent unauthorized access even after initial interception. The vulnerability's requirement for network access and user interaction limits its exploitation scope but does not eliminate the threat in environments where attackers can position themselves on the network path, such as public Wi-Fi, compromised internal networks, or through social engineering.

Mitigation Recommendations

1. Network Segmentation: Isolate affected TP-Link Archer AX53 devices on separate VLANs or network segments to limit exposure to potential MITM attackers. 2. Use VPNs or Encrypted Tunnels: Employ end-to-end encryption methods beyond SSH to protect management traffic and reduce MITM risks. 3. Avoid Credential Reuse: Enforce unique, strong credentials for device access and avoid reusing credentials across devices or services. 4. Monitor Network Traffic: Deploy intrusion detection systems (IDS) to detect unusual SSH traffic patterns or MITM attempts. 5. User Awareness: Educate users about the risks of connecting to untrusted networks and the importance of verifying device authenticity. 6. Firmware Updates: Regularly check for and apply official patches or firmware updates from TP-Link addressing this vulnerability once available. 7. Alternative Management Methods: Where feasible, use out-of-band management or secure management protocols that include entity authentication. 8. SSH Key Verification: Manually verify SSH host keys before establishing connections to detect potential MITM attacks. These steps go beyond generic advice by focusing on network architecture, credential hygiene, and proactive detection tailored to the specific vulnerability context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-10-21T12:06:08.417Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6982493ef9fa50a62fdabaf9

Added to database: 2/3/2026, 7:15:10 PM

Last enriched: 3/16/2026, 6:29:07 PM

Last updated: 3/23/2026, 10:44:54 PM

Views: 35

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses