#VU124073 Heap-based buffer overflow in Archer AX53 - CVE-2025-62673

 

#VU124073 Heap-based buffer overflow in Archer AX53 - CVE-2025-62673

Published: March 17, 2026


Vulnerability identifier: #VU124073
Vulnerability risk: Medium
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2025-62673
CWE-ID: CWE-122
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vulnerable software:
Archer AX53
Software vendor:
TP-Link

Description

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the tdpServer ssh port update functionality. A remote user on the local network can pass specially crafted data to the application, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


Remediation

Install updates from vendor's website.

External links