← Volver a CVEs
CVE-2026-30818
HIGH8.0
Descripcion
An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute arbitrary code when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow the attacker to modify device configuration, access sensitive information, or further compromise system integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Detalles CVE
Puntuacion CVSS v3.18.0
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueADJACENT_NETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado4/8/2026
Ultima modificacion4/14/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
tp-link:archer_ax53tp-link:archer_ax53_firmware
Debilidades (CWE)
CWE-78
Referencias
https://talosintelligence.com/vulnerability_reports/(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/my/support/download/archer-ax53/v1/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/faq/5055/(f23511db-6c3e-4e32-a477-6aa17d310630)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.