CVE-2025-62501
SSH Hostkey Misconfiguration in TP-Link Archer AX53 Enables Credential Theft
Publication date: 2026-02-03
Last updated on: 2026-03-16
Assigner: TPLink
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tp-link | archer_ax53_firmware | 1.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-322 | The product performs a key exchange with an actor without verifying the identity of that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an SSH Hostkey misconfiguration in the TP-Link Archer AX53 version 1.0 (tmpserver modules). It allows attackers to perform a specially crafted man-in-the-middle (MITM) attack to obtain device credentials.
If attackers capture these credentials, they could potentially reuse them to gain unauthorized access to the device.
The affected versions are Archer AX53 v1.0 through 1.3.1 Build 20241120.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing attackers to obtain your device credentials through a man-in-the-middle attack.
If attackers reuse these captured credentials, they could gain unauthorized access to your device, potentially compromising your network security.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know