This vulnerability in AX53 v1 results from insufficient...
High severity
Unreviewed
Published
Mar 20, 2026
to the GitHub Advisory Database
•
Updated Mar 20, 2026
Description
Published by the National Vulnerability Database
Mar 20, 2026
Published to the GitHub Advisory Database
Mar 20, 2026
Last updated
Mar 20, 2026
This vulnerability in AX53 v1 results from insufficient input sanitization in the device’s probe handling logic, where unvalidated parameters can trigger a stack-based buffer overflow that causes the affected service to crash and, under specific conditions, may enable remote code execution through complex heap-spray techniques.
Successful exploitation may result in repeated service unavailability and, in certain scenarios, allow an attacker to gain control of the device.
References