A command injection vulnerability on AX53 v1 occurs in mscd debug functionality due to insufficient input handling, allowing log redirection to arbitrary files and concatenation of unvalidated file content into shell commands, enabling authenticated attackers to inject and execute arbitrary commands. Successful exploitation may allow execution of malicious commands and ultimately full control of the device.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 20 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability on AX53 v1 occurs in mscd debug functionality due to insufficient input handling, allowing log redirection to arbitrary files and concatenation of unvalidated file content into shell commands, enabling authenticated attackers to inject and execute arbitrary commands. Successful exploitation may allow execution of malicious commands and ultimately full control of the device.
Title Authenticated Command Injection in mcsd Service of TP-Link Archer AX53
Weaknesses CWE-77
References
Metrics cvssV4_0

{'score': 7.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-03-20T16:31:12.808Z

Reserved: 2026-03-10T17:11:14.041Z

Link: CVE-2025-15607

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-20T17:16:40.123

Modified: 2026-03-20T17:16:40.123

Link: CVE-2025-15607

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses