| Summary | Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366 |
|---|---|
| Summary | Vulnerabilidad lógica en TP-Link Archer C20 v6.0 y Archer AX53 v1.0 (módulo TDDP) permite a atacantes adyacentes no autenticados ejecutar comandos administrativos incluyendo restablecimiento de fábrica y reinicio del dispositivo sin credenciales. Atacantes en la red adyacente pueden activar de forma remota restablecimientos de fábrica y reinicios sin credenciales, causando pérdida de configuración e interrupción de la disponibilidad del dispositivo. Este problema afecta a Archer C20 v6.0 < V6_251031. Archer AX53 v1.0 < V1_251215 |
| Publication Date | Jan. 22, 2026, 3:16 a.m. |
| Registration Date | April 27, 2026, 12:12 p.m. |
| Last Update | April 24, 2026, 3:16 a.m. |
| CVSS3.1 : HIGH | |
| スコア | 8.8 |
|---|---|
| Vector | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) | 隣接 |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | 高 |
| 完全性への影響(I) | 高 |
| 可用性への影響(A) | 高 |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:o:tp-link:archer_ax53_firmware:1.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:tp-link:archer_c20_firmware:6.0:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |