{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-0834","assignerOrgId":"f23511db-6c3e-4e32-a477-6aa17d310630","state":"PUBLISHED","assignerShortName":"TPLink","dateReserved":"2026-01-09T21:48:53.385Z","datePublished":"2026-01-21T17:14:55.179Z","dateUpdated":"2026-04-28T17:46:59.608Z"},"containers":{"cna":{"providerMetadata":{"orgId":"f23511db-6c3e-4e32-a477-6aa17d310630","shortName":"TPLink","dateUpdated":"2026-04-28T17:46:59.608Z"},"title":"Logic Vulnerability on TP-Link Archer C20, Archer AX53 and TL-WR841N v13","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-290","description":"CWE-290 Authentication Bypass by Spoofing","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-88","descriptions":[{"lang":"en","value":"CAPEC-88 OS Command Injection"}]}],"affected":[{"vendor":"TP-Link Systems Inc.","product":"Archer C20 v6.0, Archer AX53 v1.0","modules":["tddp"],"versions":[{"status":"affected","version":"0","lessThan":"V6_251031","versionType":"custom"},{"status":"affected","version":"0","lessThan":"V1_251215","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"TP-Link Systems Inc.","product":"Archer C20 V5","modules":["tddp"],"versions":[{"status":"affected","version":"0","lessThan":"US_V5_260419","versionType":"custom"},{"status":"affected","version":"0","lessThan":"EU_V5_260317","versionType":"custom"}],"defaultStatus":"unaffected"},{"vendor":"TP Link Systems Inc.","product":"TL-WR841N v13","versions":[{"status":"affected","version":"0","lessThan":"0.9.1 Build 20231120 Rel.62366","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.\n\nThis issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419\n\n\nArcher AX53 v1.0 < \n\nV1_251215\n\n\n\nTL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366","supportingMedia":[{"type":"text/html","base64":false,"value":"Logic vulnerability <span>in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (</span>TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials.&nbsp;Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.<p>This issue affects Archer C20 v6.0 &lt; V6_251031, Archer C20 v5 &lt;EU_V5_260317 or &lt;&nbsp;US_V5_260419<br>\n\nArcher AX53 v1.0 &lt; \n\nV1_251215</p><p><span>TL-WR841N v13 &lt;&nbsp;</span><span>0.9.1 Build 20231120 Rel.62366</span></p>"}]}],"references":[{"url":"https://www.tp-link.com/en/support/download/archer-c20/v6/#Firmware","tags":["patch"]},{"url":"https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware","tags":["patch"]},{"url":"https://mattg.systems/posts/cve-2026-0834/"},{"url":"https://www.tp-link.com/us/support/faq/4905/","tags":["vendor-advisory"]},{"url":"https://www.tp-link.com/us/support/download/archer-c20/v5/#Firmware","tags":["patch"]},{"url":"https://www.tp-link.com/en/support/download/archer-c20/v5/#Firmware","tags":["patch"]},{"url":"https://www.tp-link.com/us/support/download/tl-wr841n/v13/#Firmware","tags":["patch"]}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"ADJACENT","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"LOW","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"HIGH","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"HIGH","baseScore":7.2,"vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N"}}],"credits":[{"lang":"en","value":"Matt Graham (mattg.systems)","type":"finder"},{"lang":"en","value":"Ben Grinberg, Adiel Sol, Daniel Lubel, Erez Cohen, Nir Somech, Arad Inbar, Dream Group","type":"finder"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-0834","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2026-01-22T04:55:49.767529Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T14:44:34.299Z"}}]}}