Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0834: CWE-290 Authentication Bypass by Spoofing in TP-Link Systems Inc. Archer C20 v6.0, Archer AX53 v1.0

0
High
VulnerabilityCVE-2026-0834cvecve-2026-0834cwe-290
Published: Wed Jan 21 2026 (01/21/2026, 17:14:55 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer C20 v6.0, Archer AX53 v1.0

Description

Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031. Archer AX53 v1.0 < V1_251215

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 08:23:43 UTC

Technical Analysis

CVE-2026-0834 is a logic vulnerability categorized under CWE-290 (Authentication Bypass by Spoofing) found in TP-Link Systems Inc.'s Archer C20 v6.0 and Archer AX53 v1.0 routers. The vulnerability exists in the TDDP (TP-Link Device Discovery Protocol) module, which is responsible for device management and discovery on local networks. Due to improper authentication checks, an attacker connected to the adjacent network segment can send crafted requests to the device that are accepted as legitimate administrative commands without requiring any credentials. This allows the attacker to perform sensitive operations such as factory resetting the device or rebooting it, which results in loss of configuration settings and temporary denial of service. The flaw affects firmware versions earlier than V6_251031 for Archer C20 and V1_251215 for Archer AX53. The CVSS v4.0 score is 7.2 (high severity), reflecting the vulnerability's ease of exploitation (no privileges or user interaction needed), and its significant impact on availability and integrity. The vulnerability does not require network-wide access but is limited to adjacent network attackers, typically those connected to the same LAN or Wi-Fi segment. No patches were linked at the time of publication, and no known exploits have been reported in the wild, but the potential for disruption is substantial.

Potential Impact

The primary impact of CVE-2026-0834 is on the availability and integrity of affected TP-Link routers. Attackers can remotely trigger factory resets or reboots without authentication, causing loss of all user configurations and temporary network outages. This can disrupt business operations, especially for organizations relying on these routers for critical network connectivity. The loss of configuration may also expose the network to further attacks if default settings are restored and not promptly reconfigured. For home users, this can lead to loss of internet connectivity and potential exposure to other threats. Since the attack requires adjacency, it is particularly dangerous in environments where network segmentation is weak or where guest or untrusted users share the same network segment. The vulnerability could be leveraged as part of a larger attack chain to cause denial of service or to facilitate lateral movement within a network.

Mitigation Recommendations

1. Immediately apply firmware updates from TP-Link once available that address this vulnerability. Monitor TP-Link's official channels for patch releases. 2. Until patches are available, restrict access to the router's management interfaces by implementing strict network segmentation and access control lists (ACLs) to prevent untrusted devices from connecting to the same network segment as the router. 3. Disable or restrict the TDDP service if possible, or any device discovery protocols that expose administrative functions on the local network. 4. Monitor network traffic for unusual requests targeting the router's management interfaces, especially those that could trigger reboots or resets. 5. Educate network users about the risks of connecting untrusted devices to the local network. 6. Consider deploying network intrusion detection/prevention systems (IDS/IPS) that can detect and block suspicious management commands targeting the router. 7. Regularly back up router configurations to enable rapid recovery in case of forced resets.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-09T21:48:53.385Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697119084623b1157ce32430

Added to database: 1/21/2026, 6:20:56 PM

Last enriched: 2/27/2026, 8:23:43 AM

Last updated: 3/26/2026, 5:45:00 AM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses