CVE-2026-30818

HIGH

OS Command Injection Vulnerability in dnsmasq Module in TP-Link AX53

Title source: cna
STIX 2.1

Description

An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute arbitrary code when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow the attacker to modify device configuration, access sensitive information, or further compromise system integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213.

Scores

CVSS v3 8.0
EPSS 0.0016
EPSS Percentile 37.0%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-78
Status published
Products (2)
tp-link/archer_ax53_firmware < 1.7.1
TP-Link Systems Inc./AX53 v1.0 < 1.7.1 Build 20260213
Published Apr 08, 2026
Tracked Since Apr 09, 2026