This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute arbitrary code when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow the attacker to modify device configuration, access sensitive information, or further compromise system integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213. | |
| Title | OS Command Injection Vulnerability in dnsmasq Module in TP-Link AX53 | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-04-08T19:21:41.645Z
Reserved: 2026-03-05T17:35:52.175Z
Link: CVE-2026-30818
Updated: 2026-04-08T19:10:21.371Z
Status : Received
Published: 2026-04-08T19:25:20.770
Modified: 2026-04-08T19:25:20.770
Link: CVE-2026-30818
No data.
OpenCVE Enrichment
No data.