CVE-2025-9961 – Authenticated RCE by CWMP binary

The following table lists the changes that have been made to the
CVE-2025-9961 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by f23511db-6c3e-4e32-a477-6aa17d310630

    Sep. 06, 2025

    Action Type Old Value New Value
    Added Description An authenticated attacker may remotely execute arbitrary code via the CWMP binary on the devices AX10 and AX1500. 

    The exploit can only be conducted via a Man-In-The-Middle (MITM) attack. 

    This issue affects AX10 V1/V1.2/V2/V2.6/V3/V3.6: before 1.2.1; AX1500 V1/V1.20/V1.26/V1.60/V1.80/V2.60/V3.6: before 1.3.11.

    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-120
    Added Reference https://blog.byteray.co.uk/zero-day-alert-automated-discovery-of-critical-cwmp-stack-overflow-in-tp-link-routers-0bc495a08679
    Added Reference https://www.tp-link.com/us/support/download/archer-ax10/
    Added Reference https://www.tp-link.com/us/support/download/archer-ax1500/
    Added Reference https://www.tp-link.com/us/support/faq/4647/
Share the Post:

Related Posts