CVE-2026-0834
HIGHTp-link Archer Ax53 Firmware - Authentication Bypass by Spoofing
Title source: ruleDescription
Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366
Exploits (1)
References (7)
Scores
CVSS v3
8.8
EPSS
0.0001
EPSS Percentile
2.1%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-290
Status
published
Products (7)
tp-link/archer_ax53_firmware
1.0
tp-link/archer_c20_firmware
6.0
TP Link Systems Inc./TL-WR841N v13
< 0.9.1 Build 20231120 Rel.62366
TP-Link Systems Inc./Archer C20 V5
< EU_V5_260317
TP-Link Systems Inc./Archer C20 V5
< US_V5_260419
TP-Link Systems Inc./Archer C20 v6.0, Archer AX53 v1.0
< V1_251215
TP-Link Systems Inc./Archer C20 v6.0, Archer AX53 v1.0
< V6_251031
Published
Jan 21, 2026
Tracked Since
Feb 18, 2026