CVE-2026-5511
Description
In the web management interface of Archer AX72 (SG) v1, the network diagnostic feature improperly handles invalid user input, resulting in limited exposure of diagnostic command usage information.
An authenticated attacker with administrative privileges could exploit this issue to confirm the presence of the diagnostic utility and view its valid command-line syntax and options. The exposed information is limited in scope and does not include sensitive system data.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
CVE-2026-5511: TP-Link Archer AX72 v1 diagnostic interface exposes command syntax via improper input validation, requiring admin privileges.
Vulnerability
In the web management interface of TP-Link Archer AX72 (SG) v1, the network diagnostic feature improperly handles invalid user input, leading to limited exposure of diagnostic command usage information. The affected product is Archer AX72 (SG) with hardware version V1 running firmware prior to version 1.4.6 Build 20260112 rel.66206 [2].
Exploitation
An authenticated attacker with administrative privileges can trigger this vulnerability by sending crafted invalid input to the network diagnostic feature. The attacker does not require physical access or user interaction beyond the administrative login. The attack is local to the web management interface and has low complexity [2].
Impact
Successful exploitation allows the attacker to confirm the presence of the diagnostic utility and view its valid command-line syntax and options. The exposed information is limited in scope and does not include sensitive system data, resulting in a low confidentiality impact with no integrity or availability impact [2].
Mitigation
TP-Link released a fixed firmware version 1.4.6 Build 20260112 rel.66206 for Archer AX72 (SG) v1, available from the TP-Link Singapore download page [1][2]. Users in other regions are not affected. No workarounds are documented; updating to the latest firmware is the recommended mitigation [2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.