| Summary | A stack-based buffer overflow in the tmpServer module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to trigger a segmentation fault and potentially execute arbitrary code via a specially crafted configuration file. Successful exploitation may cause a crash and could allow arbitrary code execution, enabling modification of device state, exposure of sensitive data, or further compromise of device integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213. |
|---|---|
| Publication Date | April 9, 2026, 4:25 a.m. |
| Registration Date | April 15, 2026, 11:32 a.m. |
| Last Update | April 15, 2026, 1:19 a.m. |
| CVSS3.1 : HIGH | |
| スコア | 8.0 |
|---|---|
| Vector | CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | 隣接 |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 低 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:tp-link:archer_ax53_firmware:*:*:*:*:*:*:*:* | 1.7.1 | ||||
| Configuration2 | or higher | or less | more than | less than | |