CVE-2026-30817
Severity CVSS v4.0:
MEDIUM
Type:
Unavailable / Other
Publication date:
08/04/2026
Last modified:
07/05/2026
Description
An external configuration control vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows an authenticated adjacent attacker to read arbitrary files when a malicious configuration file is processed. Successful exploitation may allow unauthorized access to arbitrary files on the device, potentially exposing sensitive information.This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Impact
Base Score 4.0
6.80
Severity 4.0
MEDIUM
Base Score 3.x
5.70
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:tp-link:archer_ax53_firmware:*:*:*:*:*:*:*:* | 1.7.1 (excluding) | |
| cpe:2.3:h:tp-link:archer_ax53:1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://talosintelligence.com/vulnerability_reports/
- https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware
- https://www.tp-link.com/my/support/download/archer-ax53/v1/#Firmware
- https://www.tp-link.com/us/support/faq/5055/
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2305



