CVE-2026-30815
Severity CVSS v4.0:
HIGH
Type:
CWE-78
OS Command Injections
Publication date:
08/04/2026
Last modified:
07/05/2026
Description
An OS command injection vulnerability in the OpenVPN module<br />
of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute system commands when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow modification of configuration files, disclosure of sensitive information, or further compromise of device integrity.<br />
<br />
This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Impact
Base Score 4.0
8.50
Severity 4.0
HIGH
Base Score 3.x
8.00
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:tp-link:archer_ax53_firmware:*:*:*:*:*:*:*:* | 1.7.1 (excluding) | |
| cpe:2.3:h:tp-link:archer_ax53:1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://talosintelligence.com/vulnerability_reports/
- https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware
- https://www.tp-link.com/my/support/download/archer-ax53/v1/#Firmware
- https://www.tp-link.com/us/support/faq/5055/
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2303
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2307
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2308
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2309



