PT-2025-36367 · Ax10 +1 · Ax10 +1
Byteray
·
Published
2025-09-06
·
Updated
2025-12-05
·
CVE-2025-9961
CVSS v2.0
9.0
9.0
High
| Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
TP-Link AX10 versions prior to 1.2.1
TP-Link AX1500 versions prior to 1.3.11
Description
A flaw exists in the CWMP (CWMP/TR-069) binary of TP-Link AX10 and AX1500 routers that allows an authenticated attacker to remotely execute arbitrary code. Exploitation requires a Man-In-The-Middle (MITM) attack. The issue is due to a stack buffer overflow in the CWMP service, potentially bypassing Address Space Layout Randomization (ASLR) through techniques like Return-to-libc (ret2libc). Over 13,500 devices are estimated to be exposed. The vulnerability is exploitable even with NX bit and ASLR protections in place, utilizing Return-Oriented Programming (ROP) and existing one-day exploits. The vulnerable component is the
cwmp binary.Recommendations
TP-Link AX10 versions prior to 1.2.1: Update to version 1.2.1 or later.
TP-Link AX1500 versions prior to 1.3.11: Update to version 1.3.11 or later.
Fix
RCE
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-10825
CVE-2025-9961
Affected Products
Ax10
Ax1500
References · 30
- https://nvd.nist.gov/vuln/detail/CVE-2025-9961 · Security Note
- https://tp-link.com/us/support/download/archer-ax10 · Patch
- https://bdu.fstec.ru/vul/2025-10825 · Security Note
- https://tp-link.com/us/support/download/archer-ax1500 · Patch
- https://tp-link.com/us/support/faq/4647 · Vendor Advisory
- https://twitter.com/hackyboiz/status/1970867886358163702 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1ou6n99/top_10_trending_cves_11112025 · Reddit Post
- https://twitter.com/moton/status/1970050669584466042 · Twitter Post
- https://twitter.com/offseq/status/1964637389382386144 · Twitter Post
- https://twitter.com/dailytechonx/status/1968755654568673772 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1968952670145700349 · Twitter Post
- https://twitter.com/theByteRay/status/1970101635608178713 · Twitter Post
- https://twitter.com/HunterMapping/status/1970323381808468025 · Twitter Post
- https://twitter.com/IntCyberDigest/status/1987591777512026491 · Twitter Post
- https://twitter.com/CVEnew/status/1964379898740346904 · Twitter Post