Description
An external control of configuration vulnerability in the OpenVPN module of TP-Link AX53 v1.0 allows an authenticated adjacent attacker to read arbitrary file when a malicious configuration file is processed. Successful exploitation may allow unauthorized access to arbitrary files on the device, potentially exposing sensitive information.This issue affects AX53 v1.0: before 1.7.1 Build 20260213.
Problem types
CWE-15 External control of system or configuration setting
Product status
Any version before 1.7.1 Build 20260213
Credits
Lilith >_> of Cisco Talos
References
www.tp-link.com/my/support/download/archer-ax53/v1/
www.tp-link.com/en/support/download/archer-ax53/v1/
talosintelligence.com/vulnerability_reports/
www.tp-link.com/us/support/faq/5055/