Security Advisory on Authentication Logic Vulnerability on Multiple TP-Link Range Extenders (CVE-2026-3294)
Vulnerability and Impact Description:
CVE-2026-3294:
An authentication logic vulnerability in multiple TP-Link range extenders allows an unauthenticated attacker on an adjacent network to manipulate a login parameter and reset the administrator password due to insufficient validation.
Successful exploitation allows an attacker to obtain full administrative control of the affected device, potentially impacting on confidentiality, integrity, and availability.
CVSS v4.0 Score: 8.7 / High
CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products/Versions and Fixes:
|
Affected Product Model |
Affected Version |
|
RE305 v1 |
< V1_20260515 |
|
RE360 v1 |
< V1_20260515 |
|
RE580D v1 |
< V1_20260515 |
|
RE650 v1 |
< V1_20260429 |
|
TL-WA860RE v4 |
< V4_20260515 |
Recommendations:
We strongly recommend that users with affected devices take the following actions:
- Download and update to the latest firmware version to fix the vulnerabilities on our website.
US: Download for RE305 | TP-Link
Download for TL-WA860RE | TP-Link
EN: Download for RE305 | TP-Link
Download for TL-WA860RE | TP-Link
Disclaimer:
This advisory is provided for informational purposes only and is subject to change without notice. The information is provided “as is” without warranties of any kind. TP-Link recommends that customers apply available firmware updates or implement documented workarounds as provided in this advisory. Devices/systems that are not updated or mitigated as described may remain vulnerable, and TP-Link disclaims any responsibility or liability for any damages or losses arising from a failure to implement such updates.
Looking for More
Is this faq useful?
Your feedback helps improve this site.
TP-Link Community
Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.