An authenticated attacker with administrative privileges could exploit this issue to confirm the presence of the diagnostic utility and view its valid command-line syntax and options. The exposed information is limited in scope and does not include sensitive system data.
Project Subscriptions
No data.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 19 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 19 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In the web management interface of Archer AX72 (SG) v1, the network diagnostic feature improperly handles invalid user input, resulting in limited exposure of diagnostic command usage information. An authenticated attacker with administrative privileges could exploit this issue to confirm the presence of the diagnostic utility and view its valid command-line syntax and options. The exposed information is limited in scope and does not include sensitive system data. | |
| Title | Information Disclosure via Diagnostic Interface Due to Improper Input Validation on TP-Link's Archer AX72 | |
| Weaknesses | CWE-209 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-05-19T17:06:21.425Z
Reserved: 2026-04-03T17:31:05.618Z
Link: CVE-2026-5511
Updated: 2026-05-19T17:06:16.973Z
Status : Awaiting Analysis
Published: 2026-05-19T17:16:23.493
Modified: 2026-05-19T17:59:12.383
Link: CVE-2026-5511
No data.
OpenCVE Enrichment
Updated: 2026-05-19T17:30:10Z