Impact
The vulnerability is a logic flaw in the TDDP module of TP‑Link Archer C20, Archer AX53, and TL‑WR841N routers, allowing unauthenticated adjacent attackers to trigger administrative actions such as factory reset and device reboot without any credentials. This results in loss of configuration and interruption of device availability. The affected firmware releases include Archer C20 v6.0 firmware older than V6_251031, Archer C20 v5 firmware older than EU_V5_260317 or US_V5_260419, and Archer AX53 v1.0 firmware older than V1_251215.
Affected Systems
Affected vendors and products are TP‑Link Systems Inc. Archer C20 firmware versions older than v6.251031, older than EU_V5_260317 or US_V5_260419 for the v5 line, and Archer AX53 firmware versions older than v1.251215. These routers are typically used in home and small office environments and expose the TDDP service to neighboring devices.
Risk and Exploitability
The vulnerability has a CVSS score of 7.2, indicating high severity. EPSS shows a very low exploitation likelihood (<1%). It is not currently listed in the CISA KEV catalog. Based on the description, the attack vector is an unauthenticated attacker on the adjacent network segment exploiting the TDDP module without credentials, which can force factory resets and reboots, causing a denial of service and loss of configuration on the affected routers.
OpenCVE Enrichment