Cyber Posture

CVE-2026-30815

High

Published: 08 April 2026

Published
08 April 2026
Modified
07 May 2026
KEV Added
Patch
CVSS Score 8.0 CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0018 39.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-30815 is a high-severity OS Command Injection (CWE-78) vulnerability in Tp-Link Archer Ax53 Firmware. Its CVSS base score is 8.0 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Network Device CLI (T1059.008); ranked at the 39.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-10 (Information Input Validation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Network Device CLI (T1059.008) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly addresses the insufficient input validation flaw by requiring checks on OpenVPN configuration file inputs to prevent OS command injection.

prevent

Mandates timely identification, reporting, and correction of the specific flaw via firmware updates to version 1.7.1 Build 20260213 or later.

detectrespond

Requires vulnerability scanning to detect CVE-2026-30815 in the TP-Link Archer AX53 and remediate through patching.

MITRE ATT&CK Enterprise TechniquesAI

T1059.008 Network Device CLI Execution
Adversaries may abuse scripting or built-in command line interpreters (CLI) on network devices to execute malicious command and payloads.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

OS command injection via crafted OpenVPN config directly enables arbitrary system command execution on the network device (T1059.008) and is exploitable by a low-privileged authenticated adjacent attacker to achieve full device compromise (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

An OS command injection vulnerability in the OpenVPN module of TP-Link Archer AX53 v1.0 allows an authenticated adjacent attacker to execute system commands when a specially crafted configuration file is processed due to insufficient input validation. Successful exploitation may allow…

more

modification of configuration files, disclosure of sensitive information, or further compromise of device integrity. This issue affects AX53 v1.0: before 1.7.1 Build 20260213.

Deeper analysisAI

CVE-2026-30815 is an OS command injection vulnerability (CWE-78) in the OpenVPN module of the TP-Link Archer AX53 v1.0 router. The flaw arises from insufficient input validation when processing configuration files, enabling arbitrary command execution. It affects Archer AX53 v1.0 versions prior to firmware 1.7.1 Build 20260213 and carries a CVSS v3.1 base score of 8.0 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).

An authenticated adjacent attacker can exploit the vulnerability by providing a specially crafted OpenVPN configuration file for processing. Successful exploitation grants the ability to execute system commands, which may result in modification of configuration files, disclosure of sensitive information, or broader compromise of device integrity.

Mitigation is available through firmware updates from TP-Link, specifically version 1.7.1 Build 20260213 or later for Archer AX53 v1.0, as detailed on the manufacturer's support and download pages for various regions. Further information appears in the Talos Intelligence vulnerability report and a related TP-Link FAQ.

Details

CWE(s)

Affected Products

tp-link
archer ax53 firmware
≤ 1.7.1

CVEs Like This One

CVE-2026-30818Same product: Tp-Link Archer Ax53
CVE-2026-30814Same product: Tp-Link Archer Ax53
CVE-2025-59487Same product: Tp-Link Archer Ax53
CVE-2025-58077Same product: Tp-Link Archer Ax53
CVE-2025-59482Same product: Tp-Link Archer Ax53
CVE-2025-15607Same product: Tp-Link Archer Ax53
CVE-2025-62405Same product: Tp-Link Archer Ax53
CVE-2025-58455Same product: Tp-Link Archer Ax53
CVE-2025-62404Same product: Tp-Link Archer Ax53
CVE-2025-61983Same product: Tp-Link Archer Ax53

References