Buffer Overflow Vulnerability in TP-Link Archer AX53 by TP-Link
CVE-2026-30814

7.3HIGH

Key Information:

Status
Vendor
CVE Published:
8 April 2026

What is CVE-2026-30814?

The TP-Link Archer AX53 v1.0 exhibits a stack-based buffer overflow vulnerability within its tmpServer module. This flaw can be exploited by an adjacent authenticated attacker through a specially crafted configuration file, leading to a segmentation fault. Such exploitation could result in a crash of the device and potentially allow the attacker to execute arbitrary code. The consequences may include unauthorized modifications to the device state, exposure of sensitive data, and compromised device integrity. Users are advised to update to version 1.7.1 Build 20260213 or later to mitigate this vulnerability.

Affected Version(s)

AX53 v1.0 0 < 1.7.1 Build 20260213

References

CVSS V4

Score:
7.3
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lilith >_> of Cisco Talos
.