Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.
This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419
Archer AX53 v1.0 <
V1_251215
TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366
References
Configurations
History
28 Apr 2026, 19:36
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability. This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366 |
23 Apr 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366 | |
| References |
|
22 Apr 2026, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| Summary |
|
|
| Summary | (en) Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 |
10 Feb 2026, 16:34
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:tp-link:archer_c20_firmware:6.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_c20:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:archer_ax53_firmware:1.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:archer_ax53:-:*:*:*:*:*:*:* |
|
| First Time |
Tp-link
Tp-link archer C20 Tp-link archer Ax53 Tp-link archer Ax53 Firmware Tp-link archer C20 Firmware |
|
| References | () https://mattg.systems/posts/cve-2026-0834/ - Permissions Required | |
| References | () https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware - Product | |
| References | () https://www.tp-link.com/en/support/download/archer-c20/v6/#Firmware - Product | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
21 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
21 Jan 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-21 18:16
Updated : 2026-04-28 19:36
NVD link : CVE-2026-0834
Mitre link : CVE-2026-0834
CVE.ORG link : CVE-2026-0834
JSON object : View
Products Affected
tp-link
- archer_ax53
- archer_c20
- archer_c20_firmware
- archer_ax53_firmware
CWE
CWE-290
Authentication Bypass by Spoofing
