Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 07 May 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 14 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link archer Ax53
Tp-link archer Ax53 Firmware |
|
| Weaknesses | CWE-610 | |
| CPEs | cpe:2.3:h:tp-link:archer_ax53:1.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_ax53_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link archer Ax53
Tp-link archer Ax53 Firmware |
|
| Metrics |
cvssV3_1
|
Thu, 09 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link ax53 V1 |
|
| Vendors & Products |
Tp-link
Tp-link ax53 V1 |
Wed, 08 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An external configuration control vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows an authenticated adjacent attacker to read arbitrary files when a malicious configuration file is processed. Successful exploitation may allow unauthorized access to arbitrary files on the device, potentially exposing sensitive information.This issue affects AX53 v1.0: before 1.7.1 Build 20260213. | |
| Title | Arbitrary File Reading Vulnerability in dnsmasq Module in TP-Link AX53 | |
| Weaknesses | CWE-15 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-05-07T15:47:06.914Z
Reserved: 2026-03-05T17:35:52.174Z
Link: CVE-2026-30817
Updated: 2026-05-07T15:47:06.914Z
Status : Modified
Published: 2026-04-08T19:25:20.627
Modified: 2026-05-07T16:16:18.660
Link: CVE-2026-30817
No data.
OpenCVE Enrichment
Updated: 2026-04-15T16:15:11Z