High severity8.0NVD Advisory· Published Apr 8, 2026· Updated May 7, 2026
CVE-2026-30814
CVE-2026-30814
Description
A stack-based buffer overflow in the tmpServer module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to trigger a segmentation fault and potentially execute arbitrary code via a specially crafted configuration file. Successful exploitation may cause a crash and could allow arbitrary code execution, enabling modification of device state, exposure of sensitive data, or further compromise of device integrity.
This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- talosintelligence.com/vulnerability_reports/nvdThird Party Advisory
- www.tp-link.com/us/support/faq/5055/nvdVendor Advisory
- www.tp-link.com/en/support/download/archer-ax53/v1/nvdProduct
- www.tp-link.com/my/support/download/archer-ax53/v1/nvdProduct
- www.talosintelligence.com/vulnerability_reports/TALOS-2025-2302nvd
News mentions
0No linked articles in our index yet.