8.8
HIGH CVSS 3.1
CVE-2026-0834
Logic Vulnerability on TP-Link Archer C20, Archer AX53 and TL-WR841N v13
Description

Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability. This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366

INFO

Published Date :

Jan. 21, 2026, 6:16 p.m.

Last Modified :

April 28, 2026, 7:36 p.m.

Remotely Exploit :

No

Source :

f23511db-6c3e-4e32-a477-6aa17d310630
Affected Products

The following products are affected by CVE-2026-0834 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Tp-link archer_c20_firmware
2 Tp-link archer_c20
3 Tp-link archer_ax53_firmware
4 Tp-link archer_ax53
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH [email protected]
CVSS 4.0 MEDIUM f23511db-6c3e-4e32-a477-6aa17d310630
CVSS 4.0 MEDIUM f23511db-6c3e-4e32-a477-6aa17d310630
CVSS 4.0 HIGH f23511db-6c3e-4e32-a477-6aa17d310630
Solution
Update firmware on TP-Link routers to prevent unauthorized administrative command execution.
  • Update TP-Link Archer C20 v6.0 to version V6_251031 or later.
  • Update TP-Link Archer AX53 v1.0 to version V1_251215 or later.
  • Apply vendor-provided security patches promptly.
  • Restrict network access to devices.
Public PoC/Exploit Available at Github

CVE-2026-0834 has a 3 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-0834 is associated with the following CWEs:

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Mirror of https://github.com/nomi-sec/PoC-in-GitHub

Updated: 3 months ago
0 stars 0 fork 0 watcher
Born at : Feb. 7, 2026, 10:02 a.m. This repo has been linked 789 different CVEs too.

Proof of Concept (PoC) for the TP-Link Device Debug Protocol (TDDP) Authentication Bypass (CVE-2026-0834)

Python

Updated: 3 months, 2 weeks ago
1 stars 1 fork 1 watcher
Born at : Jan. 12, 2026, 9:01 p.m. This repo has been linked 1 different CVEs too.

📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.

security cve exploit poc vulnerability

Updated: 2 weeks ago
7667 stars 1247 fork 1247 watcher
Born at : Dec. 8, 2019, 1:03 p.m. This repo has been linked 749 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-0834 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2026-0834 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by f23511db-6c3e-4e32-a477-6aa17d310630

    Apr. 28, 2026

    Action Type Old Value New Value
    Changed Description Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366 Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability. This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366
  • CVE Modified by f23511db-6c3e-4e32-a477-6aa17d310630

    Apr. 23, 2026

    Action Type Old Value New Value
    Changed Description Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 Logic vulnerability in TP-Link Archer C20 v5, 6.0, Archer AX53 v1.0 and TL-WR841N v13 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215 TL-WR841N v13 < 0.9.1 Build 20231120 Rel.62366
    Added Reference https://www.tp-link.com/us/support/download/tl-wr841n/v13/#Firmware
  • CVE Modified by f23511db-6c3e-4e32-a477-6aa17d310630

    Apr. 22, 2026

    Action Type Old Value New Value
    Changed Description Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031. Archer AX53 v1.0 < V1_251215 Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031, Archer C20 v5 <EU_V5_260317 or < US_V5_260419 Archer AX53 v1.0 < V1_251215
    Added Reference https://www.tp-link.com/en/support/download/archer-c20/v5/#Firmware
    Added Reference https://www.tp-link.com/us/support/download/archer-c20/v5/#Firmware
    Added Reference https://www.tp-link.com/us/support/faq/4905/
  • Initial Analysis by [email protected]

    Feb. 10, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Added CPE Configuration AND OR *cpe:2.3:o:tp-link:archer_ax53_firmware:1.0:*:*:*:*:*:*:* OR cpe:2.3:h:tp-link:archer_ax53:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:tp-link:archer_c20_firmware:6.0:*:*:*:*:*:*:* OR cpe:2.3:h:tp-link:archer_c20:-:*:*:*:*:*:*:*
    Added Reference Type TPLink: https://mattg.systems/posts/cve-2026-0834/ Types: Permissions Required
    Added Reference Type TPLink: https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware Types: Product
    Added Reference Type TPLink: https://www.tp-link.com/en/support/download/archer-c20/v6/#Firmware Types: Product
  • CVE Modified by f23511db-6c3e-4e32-a477-6aa17d310630

    Jan. 21, 2026

    Action Type Old Value New Value
    Added CVSS V4.0 AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Removed CVSS V4.0 AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added Reference https://mattg.systems/posts/cve-2026-0834/
    Removed Reference https://killing.systems/posts/cve-2026-0834/
  • New CVE Received by f23511db-6c3e-4e32-a477-6aa17d310630

    Jan. 21, 2026

    Action Type Old Value New Value
    Added Description Logic vulnerability in TP-Link Archer C20 v6.0 and Archer AX53 v1.0 (TDDP module) allows unauthenticated adjacent attackers to execute administrative commands including factory reset and device reboot without credentials. Attackers on the adjacent network can remotely trigger factory resets and reboots without credentials, causing configuration loss and interruption of device availability.This issue affects Archer C20 v6.0 < V6_251031. Archer AX53 v1.0 < V1_251215
    Added CVSS V4.0 AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-290
    Added Reference https://killing.systems/posts/cve-2026-0834/
    Added Reference https://www.tp-link.com/en/support/download/archer-ax53/v1/#Firmware
    Added Reference https://www.tp-link.com/en/support/download/archer-c20/v6/#Firmware
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.