Description
An external control of configuration vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows an authenticated adjacent attacker to read arbitrary file when a malicious configuration file is processed. 
Successful
exploitation may allow unauthorized access to arbitrary files on the device,
potentially exposing sensitive information.This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Published: 2026-04-08
Score: 6.8 Medium
EPSS: n/a
KEV: No
Impact: Unauthorized File Access
Action: Patch
AI Analysis

Impact

The vulnerability resides in the OpenVPN module of TP‑Link AX53 firmware v1.0. An authenticated adjacent attacker can supply a crafted configuration file that, when processed, permits reading of arbitrary files on the device. This flaw enables unauthorized disclosure of sensitive data stored on the router, potentially exposing configuration secrets, credentials, or other confidential information.

Affected Systems

TP‑Link AX53 routers running firmware version 1.0 are affected. The issue is present before firmware build 1.7.1 Build 20260213, so any device with a firmware release older than that is vulnerable.

Risk and Exploitability

The CVSS score of 6.8 indicates medium severity, and the lack of an EPSS rating means an exact exploitation likelihood is unknown. The flaw is not currently tracked in the CISA KEV catalog. Because the attacker must first be authenticated on the local network, the context is an adjacent attacker with network access. Once authenticated, the exploit is straightforward: upload or push a malicious VPN configuration file, causing the router to read and return the content of arbitrary files.

Generated by OpenCVE AI on April 8, 2026 at 19:35 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the TP‑Link AX53 firmware to version 1.7.1 Build 20260213 or later using the links provided by TP‑Link
  • If a firmware update is not immediately available, disable the OpenVPN service or block access to configuration files to prevent processing of malicious uploads
  • Verify that no unauthorized configuration files exist on the router and monitor system logs for unusual file access attempts

Generated by OpenCVE AI on April 8, 2026 at 19:35 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description An external control of configuration vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows an authenticated adjacent attacker to read arbitrary file when a malicious configuration file is processed.  Successful exploitation may allow unauthorized access to arbitrary files on the device, potentially exposing sensitive information.This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Title Arbitrary File Reading Vulnerability in OpenVPN Module in TP-Link AX53
Weaknesses CWE-15
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-04-08T19:21:56.624Z

Reserved: 2026-03-05T17:35:52.174Z

Link: CVE-2026-30816

cve-icon Vulnrichment

Updated: 2026-04-08T19:10:57.236Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-08T19:25:20.477

Modified: 2026-04-08T21:26:13.410

Link: CVE-2026-30816

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:38:51Z

Weaknesses