CVE-2026-0834

HIGH

Tp-link Archer Ax53 Firmware - Authentication Bypass by Spoofing

Title source: rule

Description

Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366

Exploits (1)

nomisec WORKING POC
by mattgsys · poc
https://github.com/mattgsys/CVE-2026-0834

Scores

CVSS v3 8.8
EPSS 0.0001
EPSS Percentile 2.1%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-290
Status published
Products (7)
tp-link/archer_ax53_firmware 1.0
tp-link/archer_c20_firmware 6.0
TP Link Systems Inc./TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366
TP-Link Systems Inc./Archer C20 V5 < EU_V5_260317
TP-Link Systems Inc./Archer C20 V5 < US_V5_260419
TP-Link Systems Inc./Archer C20 v6.0, Archer AX53 v1.0 < V1_251215
TP-Link Systems Inc./Archer C20 v6.0, Archer AX53 v1.0 < V6_251031
Published Jan 21, 2026
Tracked Since Feb 18, 2026