In the web management interface of Archer AX72 (SG) v1, the network diagnostic feature improperly handles invalid user input, resulting in limited exposure of diagnostic command usage information.
An authenticated attacker with administrative privileges could exploit this issue to confirm the presence of the diagnostic utility and view its valid command-line syntax and options. The exposed information is limited in scope and does not include sensitive system data.
Metrics
Affected Vendors & Products
References
History
Wed, 20 May 2026 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link archer Ax72 |
|
| Vendors & Products |
Tp-link
Tp-link archer Ax72 |
Tue, 19 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the web management interface of Archer AX72 (SG) v1, the network diagnostic feature improperly handles invalid user input, resulting in limited exposure of diagnostic command usage information. An authenticated attacker with administrative privileges could exploit this issue to confirm the presence of the diagnostic utility and view its valid command-line syntax and options. The exposed information is limited in scope and does not include sensitive system data. | |
| Title | Information Disclosure via Diagnostic Interface Due to Improper Input Validation on TP-Link's Archer AX72 | |
| Weaknesses | CWE-209 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published: 2026-05-19T15:58:46.404Z
Updated: 2026-05-19T17:06:21.425Z
Reserved: 2026-04-03T17:31:05.618Z
Link: CVE-2026-5511
Updated: 2026-05-19T17:06:16.973Z
Status : Awaiting Analysis
Published: 2026-05-19T17:16:23.493
Modified: 2026-05-19T17:59:12.383
Link: CVE-2026-5511
No data.