OS Command Injection Vulnerability in TP-Link Archer AX53
CVE-2026-30818

8.5HIGH

Key Information:

Status
Vendor
CVE Published:
8 April 2026

What is CVE-2026-30818?

The dnsmasq module within the TP-Link Archer AX53 v1.0 is susceptible to an OS command injection vulnerability. This issue can be exploited by an authenticated adjacent attacker who sends a specially crafted configuration file, which the device processes without adequate input validation. Successful exploitation provides the attacker with the capability to execute arbitrary code, alter device settings, access confidential information, or compromise overall system integrity. Affected users are encouraged to upgrade to the latest firmware version to mitigate these risks.

Affected Version(s)

AX53 v1.0 0 < 1.7.1 Build 20260213

References

CVSS V4

Score:
8.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Lilith >_> of Cisco Talos
.