HIGHVulnerability
Verified
Global

NVD HIGH: CVE-2026-30818 — An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX...

·Source: NIST NVD

Updated:

Executive Summary

An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute arbitrary code when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow the attacker to modify device configuration, access sensitive information, or further compromise system integrity.

Analysis

An OS command injection vulnerability in the dnsmasq module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute arbitrary code when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow the attacker to modify device configuration, access sensitive information, or further compromise system integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213. CVSS Score: 8. Published: 2026-04-08T19:25:20.770.

Indicators of Compromise (1)

CVE (1)
CVE-2026-30818
Source Attribution

Originally published by NIST NVD on Apr 8, 2026. Verified by: NIST.

Related Threats