In the web management interface of Archer AX72 (SG) v1, the network diagnostic feature improperly handles invalid user input, resulting in limited exposure of diagnostic command usage information.  An authenticated attacker with administrative privileges could exploit this issue to confirm the presence of the diagnostic utility and view its valid command-line syntax and options.  The exposed information is limited in scope and does not include sensitive system data.
History

Wed, 20 May 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link archer Ax72
Vendors & Products Tp-link
Tp-link archer Ax72

Tue, 19 May 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 19 May 2026 16:45:00 +0000

Type Values Removed Values Added
Description In the web management interface of Archer AX72 (SG) v1, the network diagnostic feature improperly handles invalid user input, resulting in limited exposure of diagnostic command usage information.  An authenticated attacker with administrative privileges could exploit this issue to confirm the presence of the diagnostic utility and view its valid command-line syntax and options.  The exposed information is limited in scope and does not include sensitive system data.
Title Information Disclosure via Diagnostic Interface Due to Improper Input Validation on TP-Link's Archer AX72
Weaknesses CWE-209
References
Metrics cvssV4_0

{'score': 4.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published: 2026-05-19T15:58:46.404Z

Updated: 2026-05-19T17:06:21.425Z

Reserved: 2026-04-03T17:31:05.618Z

Link: CVE-2026-5511

cve-icon Vulnrichment

Updated: 2026-05-19T17:06:16.973Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-19T17:16:23.493

Modified: 2026-05-19T17:59:12.383

Link: CVE-2026-5511

cve-icon Redhat

No data.