Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031.


Archer AX53 v1.0 <

V1_251215

Project Subscriptions

Vendors Products
Tp-link Subscribe
Archer Ax53 Subscribe
Archer Ax53 Firmware Subscribe
Archer C20 Subscribe
Archer C20 Firmware Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 10 Feb 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link archer Ax53 Firmware
Tp-link archer C20 Firmware
CPEs cpe:2.3:h:tp-link:archer_ax53:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_c20:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_ax53_firmware:1.0:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_c20_firmware:6.0:*:*:*:*:*:*:*
Vendors & Products Tp-link archer Ax53 Firmware
Tp-link archer C20 Firmware
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link archer Ax53
Tp-link archer C20
Vendors & Products Tp-link
Tp-link archer Ax53
Tp-link archer C20

Wed, 21 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 20:30:00 +0000

Type Values Removed Values Added
References

Wed, 21 Jan 2026 19:30:00 +0000

Type Values Removed Values Added
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}

cvssV4_0

{'score': 7.2, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N'}


Wed, 21 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
References

Wed, 21 Jan 2026 17:30:00 +0000

Type Values Removed Values Added
Description Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031. Archer AX53 v1.0 < V1_251215
Title Logic Vulnerability on TP-Link Archer C20 and Archer AX53
Weaknesses CWE-290
References
Metrics cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-01-22T04:55:48.987Z

Reserved: 2026-01-09T21:48:53.385Z

Link: CVE-2026-0834

cve-icon Vulnrichment

Updated: 2026-01-21T18:36:14.293Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-21T18:16:24.773

Modified: 2026-02-10T16:34:23.943

Link: CVE-2026-0834

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-22T10:14:52Z

Weaknesses