PT-2025-36367 · Ax10+1 · Ax10+1
Byteray
·
Published
2025-09-06
·
Updated
2026-02-17
·
CVE-2025-9961
CVSS v2.0
9.0
9.0
High
| Base vector | Vector | AV:N/AC:L/Au:S/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
TP-Link AX10 versions prior to 1.2.1
TP-Link AX1500 versions prior to 1.3.11
Description
A flaw exists in the CWMP (CWMP/TR-069) binary of TP-Link AX10 and AX1500 routers that could allow an authenticated attacker to remotely execute arbitrary code. Exploitation requires a Man-In-The-Middle (MITM) attack. The issue is due to a stack buffer overflow in the CWMP service, even with Address Space Layout Randomization (ASLR) and NX bit protections in place. Exploitation can be achieved using Return-Oriented Programming (ROP) techniques. Over 13,500 devices are estimated to be exposed. The vulnerability allows for remote code execution, potentially giving attackers full control of the affected devices.
Recommendations
TP-Link AX10 versions prior to 1.2.1 should be updated to version 1.2.1 or later.
TP-Link AX1500 versions prior to 1.3.11 should be updated to version 1.3.11 or later.
Fix
RCE
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2025-10825
CVE-2025-9961
Affected Products
Ax10
Ax1500
References · 33
- https://tp-link.com/us/support/faq/4647 · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-10825 · Security Note
- https://tp-link.com/us/support/download/archer-ax10 · Patch
- https://nvd.nist.gov/vuln/detail/CVE-2025-9961 · Security Note
- https://tp-link.com/us/support/download/archer-ax1500 · Patch
- https://twitter.com/pwn2dav/status/1996839716088696970 · Twitter Post
- https://t.me/canyoupwnme/6927 · Telegram Post
- https://twitter.com/fridaysecurity/status/1969917497286836292 · Twitter Post
- https://twitter.com/theByteRay/status/1970101635608178713 · Twitter Post
- https://twitter.com/hackyboiz/status/1970867886358163702 · Twitter Post
- https://twitter.com/IntCyberDigest/status/1987591777512026491 · Twitter Post
- https://t.me/cveNotify/134540 · Telegram Post
- https://twitter.com/0xor0ne/status/2022710007108706562 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1ov27sg/top_10_trending_cves_12112025 · Reddit Post
- https://twitter.com/offseq/status/1964637389382386144 · Twitter Post