Impact
An external control of configuration vulnerability in the OpenVPN module allows an authenticated adjacent attacker to supply a malicious configuration file that the router processes. When processed, the module can read any file on the device, exposing sensitive data. The flaw stems from improper validation of configuration inputs (CWE‑15 and CWE‑610), enabling information disclosure without execution of arbitrary code.
Affected Systems
TP‑Link Systems Inc. router Archer AX53, firmware version 1.0, before the release of firmware 1.7.1 Build 20260213. Devices running any earlier firmware are potentially affected.
Risk and Exploitability
The CVSS score is 6.8, indicating a moderate severity. The EPSS score is below 1 %, suggesting a low likelihood of exploitation currently. The vulnerability is not listed in CISA’s KEV catalogue. Because the attack requires an attacker to be authenticated on an adjacent network segment, adjacent local‑network access is a prerequisite. If such access is achieved, the attacker can read arbitrary files and compromise confidentiality.
OpenCVE Enrichment