← Voltar para CVEs
CVE-2026-30815
HIGH8.0
Descricao
An OS command injection vulnerability in the OpenVPN module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute system commands when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow modification of configuration files, disclosure of sensitive information, or further compromise of device integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Detalhes CVE
Pontuacao CVSS v3.18.0
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueADJACENT_NETWORK
ComplexidadeLOW
Privilegios necessariosLOW
Interacao do usuarioNONE
Publicado4/8/2026
Ultima modificacao4/14/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
tp-link:archer_ax53tp-link:archer_ax53_firmware
Fraquezas (CWE)
CWE-78
Referencias
https://talosintelligence.com/vulnerability_reports/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/my/support/download/archer-ax53/v1/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/faq/5055/(f23511db-6c3e-4e32-a477-6aa17d310630)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.