Description
An external control of configuration vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows an authenticated adjacent attacker to read arbitrary file when a malicious configuration file is processed. 
Successful
exploitation may allow unauthorized access to arbitrary files on the device,
potentially exposing sensitive information.This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Published: 2026-04-08
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized read of arbitrary files
Action: Immediate Patch
AI Analysis

Impact

An external control of configuration vulnerability in the OpenVPN module allows an authenticated adjacent attacker to supply a malicious configuration file that the router processes. When processed, the module can read any file on the device, exposing sensitive data. The flaw stems from improper validation of configuration inputs (CWE‑15 and CWE‑610), enabling information disclosure without execution of arbitrary code.

Affected Systems

TP‑Link Systems Inc. router Archer AX53, firmware version 1.0, before the release of firmware 1.7.1 Build 20260213. Devices running any earlier firmware are potentially affected.

Risk and Exploitability

The CVSS score is 6.8, indicating a moderate severity. The EPSS score is below 1 %, suggesting a low likelihood of exploitation currently. The vulnerability is not listed in CISA’s KEV catalogue. Because the attack requires an attacker to be authenticated on an adjacent network segment, adjacent local‑network access is a prerequisite. If such access is achieved, the attacker can read arbitrary files and compromise confidentiality.

Generated by OpenCVE AI on April 14, 2026 at 17:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to version 1.7.1 Build 20260213 or later, which removes the vulnerable OpenVPN configuration handling.
  • If an upgrade is not immediately possible, restrict access to the router’s management interface and deny local network hosts from configuring OpenVPN.
  • Disable the OpenVPN service entirely if it is not needed, removing the attack surface.

Generated by OpenCVE AI on April 14, 2026 at 17:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link archer Ax53
Tp-link archer Ax53 Firmware
Weaknesses CWE-610
CPEs cpe:2.3:h:tp-link:archer_ax53:1.0:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_ax53_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link archer Ax53
Tp-link archer Ax53 Firmware
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link ax53 V1
Vendors & Products Tp-link
Tp-link ax53 V1

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description An external control of configuration vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows an authenticated adjacent attacker to read arbitrary file when a malicious configuration file is processed.  Successful exploitation may allow unauthorized access to arbitrary files on the device, potentially exposing sensitive information.This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Title Arbitrary File Reading Vulnerability in OpenVPN Module in TP-Link AX53
Weaknesses CWE-15
References
Metrics cvssV4_0

{'score': 6.8, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Tp-link Archer Ax53 Archer Ax53 Firmware Ax53 V1
cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-04-08T19:21:56.624Z

Reserved: 2026-03-05T17:35:52.174Z

Link: CVE-2026-30816

cve-icon Vulnrichment

Updated: 2026-04-08T19:10:57.236Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-08T19:25:20.477

Modified: 2026-04-14T16:19:50.740

Link: CVE-2026-30816

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:15:11Z

Weaknesses