CVE-2026-30818
Received Received - Intake
OS Command Injection in TP-Link Archer AX53 dnsmasq Module

Publication date: 2026-04-08

Last updated on: 2026-04-14

Assigner: TPLink

Description
An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute arbitrary code when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow the attacker to modify device configuration, access sensitive information, or further compromise system integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tp-link archer_ax53_firmware to 1.7.1 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-78 The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows an authenticated adjacent attacker to execute arbitrary code, potentially modifying device configuration and accessing sensitive information. Such unauthorized access and modification could lead to non-compliance with standards and regulations like GDPR and HIPAA, which require protection of sensitive data and system integrity.

However, specific impacts on compliance with these standards are not detailed in the provided information.


Can you explain this vulnerability to me?

This vulnerability is an OS command injection issue found in the dnsmasq module of the TP-Link Archer AX53 version 1.0. It allows an authenticated attacker who is adjacent (on the same network segment) to execute arbitrary code by processing a specially crafted configuration file. The root cause is insufficient input validation in the dnsmasq module.


How can this vulnerability impact me? :

Successful exploitation of this vulnerability can allow an attacker to modify the device's configuration, access sensitive information stored on the device, or further compromise the system's integrity by executing arbitrary code.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart