Impact
An authenticated adjacent attacker can read arbitrary files on a TP‑Link AX53 router by loading a malicious OpenVPN configuration file. The vulnerability allows disclosure of sensitive device data and potentially other configuration information, constituting a confidentiality breach.
Affected Systems
TP‑Link Archer AX53 router, firmware version 1.0 and all releases prior to 1.7.1 Build 20260213 are affected.
Risk and Exploitability
The vulnerability has a CVSS score of 6.8, indicating moderate severity, and an EPSS score of less than 1%, indicating a low probability of exploitation. It is not listed in the CISA KEV catalog. The likely attack vector involves an authenticated adversary with local network access to the router, enabling them to upload or replace an OpenVPN configuration file to trigger the read operation.
OpenCVE Enrichment