OS Command Injection Vulnerability in TP-Link Archer AX53
CVE-2026-30815

8.5HIGH

Key Information:

Status
Vendor
CVE Published:
8 April 2026

What is CVE-2026-30815?

The OpenVPN module in the TP-Link Archer AX53 v1.0 is susceptible to an OS command injection vulnerability, which allows an authenticated adjacent attacker to execute arbitrary system commands by manipulating the processing of a specially crafted configuration file. This vulnerability arises from inadequate input validation. If successfully exploited, it could lead to unauthorized alterations of configuration files, exposure of sensitive information, or even further compromises to the overall integrity of the device. Users are strongly advised to update to the latest firmware to mitigate this risk.

Affected Version(s)

AX53 v1.0 0 < 1.7.1 Build 20260213

References

CVSS V4

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lilith >_> of Cisco Talos
.