No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Mar 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link ax53 V1 |
|
| Vendors & Products |
Tp-link
Tp-link ax53 V1 |
Fri, 20 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A command injection vulnerability on AX53 v1 occurs in mscd debug functionality due to insufficient input handling, allowing log redirection to arbitrary files and concatenation of unvalidated file content into shell commands, enabling authenticated attackers to inject and execute arbitrary commands. Successful exploitation may allow execution of malicious commands and ultimately full control of the device. | |
| Title | Authenticated Command Injection in mcsd Service of TP-Link Archer AX53 | |
| Weaknesses | CWE-77 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-03-23T13:01:13.613Z
Reserved: 2026-03-10T17:11:14.041Z
Link: CVE-2025-15607
Updated: 2026-03-23T13:01:10.503Z
Status : Awaiting Analysis
Published: 2026-03-20T17:16:40.123
Modified: 2026-03-24T15:54:09.400
Link: CVE-2025-15607
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:53:13Z