Input Handling Flaw in Archer AX72 Web Interface Exposes Command Usage
CVE-2026-5511

4.6MEDIUM

What is CVE-2026-5511?

The Archer AX72 (SG) v1 features a network diagnostic tool within its web management interface that inadequately processes certain user inputs. This flaw can be exploited by authenticated users with administrative rights, allowing them to ascertain the existence of the diagnostic utility and access its valid command-line syntax, albeit without revealing sensitive system data. This exposure of command usage might assist potential attackers in understanding the utility's capabilities, emphasizing the need for securing the web management functionalities.

Affected Version(s)

Archer AX72 (SG) v1.0 0 < 1.4.6 Build 20260112 rel.66206

References

CVSS V4

Score:
4.6
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

George Chen
.