Security Advisory on Multiple Vulnerabilities on Archer AX53 (CVE-2026-30814, CVE-2026-30815, CVE-2026-30816, CVE-2026-30817, CVE-2026-30818)
Multiple vulnerabilities were identified in TP-Link Archer AX53 v1.0 across the tmpserver, dnsmasq, and OpenVPN modules.
Description of Vulnerabilities and Impacts:
1. OS Command Injection Vulnerabilities
CVE-2026-30815: OpenVPN Module
An OS command injection vulnerability in the OpenVPN module allows an authenticated adjacent attacker to execute system commands when a specially crafted configuration file is processed due to insufficient input validation.
Successful exploitation may allow modification of configuration files, disclosure of sensitive information, or further compromise of device integrity.
CVE-2026-30818: dnsmasq Module
An OS command injection vulnerability in the dnsmasq module allows an authenticated adjacent attacker to execute arbitrary code when a specially crafted configuration file is processed due to insufficient input validation.
Successful exploitation may allow the attacker to modify device configuration, access sensitive information, or further compromise system integrity.
CVSS v4.0 Score: 8.5 / High
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
2. Buffer Overflow Vulnerability
CVE-2026-30814: tmpServer Module
A stack-based buffer overflow in the tmpServer module allows an authenticated adjacent attacker to trigger a segmentation fault and potentially execute arbitrary code via a specially crafted configuration file.
Successful exploitation may cause a crash and could allow arbitrary code execution, enabling modification of device state, exposure of sensitive data, or further compromise of device integrity.
CVSS v4.0 Score: 7.3 / High
CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L
3. Arbitrary File Reading Vulnerabilities
CVE-2026-30816: OpenVPN Module
An external configuration control vulnerability in the OpenVPN module allows an authenticated adjacent attacker to read arbitrary files when a malicious configuration file is processed. Successful exploitation may allow unauthorized access to arbitrary files on the device, potentially exposing sensitive information.
CVE-2026-30817: dnsmasq Module
An external configuration control vulnerability in the OpenVPN module allows an authenticated adjacent attacker to read arbitrary files when a malicious configuration file is processed. Successful exploitation may allow unauthorized access to arbitrary files on the device, potentially exposing sensitive information.
Severity for CVE-2026-30816 and CVE-2026-30817
CVSS v4.0 Score: 6.8 / Medium
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
Affected Products/Versions and Fixes:
|
Product Model |
Affected Version |
|
Archer AX53 v1.0 |
< 1.7.1 Build 20260213 |
Recommendations:
We strongly recommend that users with affected devices take the following actions:
- Download and update to the latest firmware version to fix the vulnerabilities:
EN: Download for Archer AX53 | TP-Link
MY: Download for Archer AX53 | TP-Link Malaysia
Note: AX53 v1 is not sold in the US.
Disclaimer:
If you do not take all recommended actions, these vulnerabilities may remain. TP-Link cannot bear any responsibility for consequences that could have been avoided by following this advisory.
Is this faq useful?
Your feedback helps improve this site.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.