Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031.
Archer AX53 v1.0 <
V1_251215
References
| Link | Resource |
|---|---|
| https://mattg.systems/posts/cve-2026-0834/ | Permissions Required |
| https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware | Product |
| https://www.tp-link.com/en/support/download/archer-c20/v6/#Firmware | Product |
Configurations
History
10 Feb 2026, 16:34
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:tp-link:archer_c20_firmware:6.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_c20:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_ax53_firmware:1.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_ax53:-:*:*:*:*:*:*:* |
|
| First Time |
Tp-link
Tp-link archer C20 Tp-link archer Ax53 Tp-link archer Ax53 Firmware Tp-link archer C20 Firmware |
|
| References | () https://mattg.systems/posts/cve-2026-0834/ - Permissions Required | |
| References | () https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware - Product | |
| References | () https://www.tp-link.com/en/support/download/archer-c20/v6/#Firmware - Product | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
21 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
21 Jan 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-21 18:16
Updated : 2026-02-10 16:34
NVD link : CVE-2026-0834
Mitre link : CVE-2026-0834
CVE.ORG link : CVE-2026-0834
JSON object : View
Products Affected
tp-link
- archer_ax53
- archer_c20
- archer_c20_firmware
- archer_ax53_firmware
CWE
CWE-290
Authentication Bypass by Spoofing
