← Back to CVEs
CVE-2025-62501
HIGH8.1
Description
SSH Hostkey misconfiguration vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows attackers to obtain device credentials through a specially crafted man‑in‑the‑middle (MITM) attack. This could enable unauthorized access if captured credentials are reused.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.
CVE Details
CVSS v3.1 Score8.1
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityHIGH
Privileges RequiredNONE
User InteractionNONE
Published2/3/2026
Last Modified3/16/2026
Sourcenvd
Honeypot Sightings0
Affected Products
tp-link:archer_ax53tp-link:archer_ax53_firmware
Weaknesses (CWE)
CWE-322
References
https://talosintelligence.com/vulnerability_reports/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/my/support/download/archer-ax53/v1/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/faq/4943/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2291(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.