VYPR
Medium severityNVD Advisory· Published May 19, 2026· Updated May 19, 2026

CVE-2026-5511

CVE-2026-5511

Description

In the web management interface of Archer AX72 (SG) v1, the network diagnostic feature improperly handles invalid user input, resulting in limited exposure of diagnostic command usage information.

An authenticated attacker with administrative privileges could exploit this issue to confirm the presence of the diagnostic utility and view its valid command-line syntax and options.  The exposed information is limited in scope and does not include sensitive system data.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

CVE-2026-5511: TP-Link Archer AX72 v1 diagnostic interface exposes command syntax via improper input validation, requiring admin privileges.

Vulnerability

In the web management interface of TP-Link Archer AX72 (SG) v1, the network diagnostic feature improperly handles invalid user input, leading to limited exposure of diagnostic command usage information. The affected product is Archer AX72 (SG) with hardware version V1 running firmware prior to version 1.4.6 Build 20260112 rel.66206 [2].

Exploitation

An authenticated attacker with administrative privileges can trigger this vulnerability by sending crafted invalid input to the network diagnostic feature. The attacker does not require physical access or user interaction beyond the administrative login. The attack is local to the web management interface and has low complexity [2].

Impact

Successful exploitation allows the attacker to confirm the presence of the diagnostic utility and view its valid command-line syntax and options. The exposed information is limited in scope and does not include sensitive system data, resulting in a low confidentiality impact with no integrity or availability impact [2].

Mitigation

TP-Link released a fixed firmware version 1.4.6 Build 20260112 rel.66206 for Archer AX72 (SG) v1, available from the TP-Link Singapore download page [1][2]. Users in other regions are not affected. No workarounds are documented; updating to the latest firmware is the recommended mitigation [2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.