Impact
The vulnerability is a logic flaw in the TDDP module of TP‑Link Archer C20 v6.0 and Archer AX53 v1.0. It allows an attacker who shares an adjacent network to trigger administrative actions such as factory reset and device reboot without any credentials. The impact is loss of configuration and service interruption of the device, which can affect all devices relying on the router.
Affected Systems
Affected vendors and products are TP‑Link Systems Inc. Archer C20 firmware versions older than v6.251031 and Archer AX53 firmware versions older than v1.251215. These routers are typically used in home and small office environments and expose the TDDP service to neighboring devices.
Risk and Exploitability
The vulnerability has a CVSS score of 7.2, indicating high severity. EPSS shows a very low exploitation likelihood (<1%). It is not currently listed in the CISA KEV catalog. Based on the description, the attack vector is an unauthenticated attacker on the adjacent network segment exploiting the TDDP module without credentials, which can force factory resets and reboots, causing a denial of service and loss of configuration on the affected routers.
OpenCVE Enrichment