Description
An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute arbitrary code when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow the attacker to modify device configuration, access sensitive information, or further compromise system integrity.

This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Published: 2026-04-08
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

An OS command injection flaw exists in the dnsmasq module of TP‑Link Archer AX53 v1.0 routers. The flaw arises from insufficient validation of configuration file inputs, allowing an authenticated attacker on the same network to place malicious directives that are later executed by the system as shell commands. Successful exploitation can give the attacker the ability to alter device settings, read confidential data stored on the router, or take additional actions to compromise system integrity.

Affected Systems

This vulnerability affects TP‑Link Archer AX53 routers running firmware version 1.0 (up to but not including 1.7.1 Build 20260213). The affected device is identified by product name Archer AX53 and CPE cpe:2.3:h:tp‑link:archer_ax53:1.0. Only the v1.0 firmware is impacted. Subsequent firmware releases (e.g., 1.7.1 Build 20260213 and later) contain a fix.

Risk and Exploitability

The CVSS base score is 8.5, indicating a high severity vulnerability that can lead to full remote code execution. The EPSS score of less than 1% suggests that the exploit is unlikely to be widely used at present, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. The likely attack vector, inferred from the requirement for an authenticated adjacent attacker, is a local network compromise where a malicious device or user can upload a crafted configuration file to the router. Once the file is processed, malicious commands are executed with the privileges of the dnsmasq process, potentially granting the attacker persistent control over the router.

Generated by OpenCVE AI on April 14, 2026 at 17:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the router firmware to version 1.7.1 Build 20260213 or any later release available from TP‑Link’s support site.
  • If an update cannot be applied immediately, isolate the device from untrusted local networks by limiting network access or disabling remote management features until a patch is installed.

Generated by OpenCVE AI on April 14, 2026 at 17:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 07 May 2026 16:30:00 +0000


Tue, 14 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link archer Ax53
Tp-link archer Ax53 Firmware
CPEs cpe:2.3:h:tp-link:archer_ax53:1.0:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_ax53_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link archer Ax53
Tp-link archer Ax53 Firmware
Metrics cvssV3_1

{'score': 8.0, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Thu, 09 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link ax53 V1
Vendors & Products Tp-link
Tp-link ax53 V1

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute arbitrary code when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow the attacker to modify device configuration, access sensitive information, or further compromise system integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Title OS Command Injection Vulnerability in dnsmasq Module in TP-Link AX53
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L'}


Subscriptions

Tp-link Archer Ax53 Archer Ax53 Firmware Ax53 V1
cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-05-07T15:47:07.905Z

Reserved: 2026-03-05T17:35:52.175Z

Link: CVE-2026-30818

cve-icon Vulnrichment

Updated: 2026-05-07T15:47:07.905Z

cve-icon NVD

Status : Modified

Published: 2026-04-08T19:25:20.770

Modified: 2026-05-07T16:16:18.780

Link: CVE-2026-30818

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T16:15:11Z

Weaknesses