This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link ax53 V1 |
|
| Vendors & Products |
Tp-link
Tp-link ax53 V1 |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute arbitrary code when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow the attacker to modify device configuration, access sensitive information, or further compromise system integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213. | |
| Title | OS Command Injection Vulnerability in dnsmasq Module in TP-Link AX53 | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-04-09T03:56:18.130Z
Reserved: 2026-03-05T17:35:52.175Z
Link: CVE-2026-30818
Updated: 2026-04-08T19:10:21.371Z
Status : Awaiting Analysis
Published: 2026-04-08T19:25:20.770
Modified: 2026-04-08T21:26:13.410
Link: CVE-2026-30818
No data.
OpenCVE Enrichment
Updated: 2026-04-09T08:27:59Z