Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0834: CWE-290 Authentication Bypass by Spoofing in TP-Link Systems Inc. Archer C20 v6.0, Archer AX53 v1.0

0
High
VulnerabilityCVE-2026-0834cvecve-2026-0834cwe-290
Published: Wed Jan 21 2026 (01/21/2026, 17:14:55 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer C20 v6.0, Archer AX53 v1.0

Description

Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031. Archer AX53 v1.0 < V1_251215

AI-Powered Analysis

AILast updated: 01/21/2026, 18:36:01 UTC

Technical Analysis

CVE-2026-0834 is a logic vulnerability classified under CWE-290 (Authentication Bypass by Spoofing) found in TP-Link Systems Inc. routers Archer C20 v6.0 and Archer AX53 v1.0. The vulnerability resides in the TDDP (TP-Link Device Discovery Protocol) module, which improperly handles authentication checks, allowing unauthenticated attackers on the adjacent network to send commands that should require administrative privileges. Specifically, attackers can remotely trigger administrative functions such as factory reset and device reboot without providing any credentials. This results in loss of device configuration and temporary denial of service due to device unavailability. The flaw affects firmware versions earlier than V6_251031 for Archer C20 and V1_251215 for Archer AX53. The attack vector is limited to adjacent network access, meaning the attacker must be on the same local network segment or connected via Wi-Fi. No user interaction or prior authentication is required, making exploitation straightforward if the attacker has network proximity. The CVSS 4.0 base score is 5.3, indicating medium severity, with attack vector (AV) as adjacent network (A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and low impact on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). There are no known exploits in the wild at the time of publication, and no official patches have been linked yet. The vulnerability could be leveraged to disrupt network availability and cause operational issues by forcing devices to reset or reboot unexpectedly.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to network availability and operational continuity. Devices affected are consumer and small office routers commonly used in home offices, small businesses, and branch offices. An attacker with adjacent network access (e.g., via compromised Wi-Fi or LAN access) can cause repeated device reboots or factory resets, leading to loss of configuration and network downtime. This can disrupt business operations, especially in environments relying on these devices for internet connectivity or VPN termination. Confidentiality and integrity impacts are low, as the vulnerability does not directly allow data exfiltration or modification. However, repeated disruptions could facilitate further attacks or cause loss of productivity. The risk is heightened in organizations with less segmented networks or where these devices serve critical roles without additional protections. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed given the low complexity of the attack.

Mitigation Recommendations

1. Monitor TP-Link’s official channels for firmware updates addressing CVE-2026-0834 and apply patches promptly once available. 2. Segment management interfaces and restrict access to router administrative functions to trusted network segments only, preventing adjacent network attackers from reaching the TDDP service. 3. Disable or restrict the TDDP module or related discovery services if not required for network operations. 4. Implement network access controls such as client isolation on Wi-Fi networks to limit lateral movement and adjacent network access by untrusted devices. 5. Regularly audit router configurations and logs for unexpected reboots or factory resets that may indicate exploitation attempts. 6. Educate users about the risks of connecting unknown devices to internal networks and enforce strong network access policies. 7. Consider deploying network intrusion detection systems capable of identifying anomalous administrative command attempts targeting routers.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-09T21:48:53.385Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697119084623b1157ce32430

Added to database: 1/21/2026, 6:20:56 PM

Last enriched: 1/21/2026, 6:36:01 PM

Last updated: 1/21/2026, 11:53:09 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats