CVE-2026-22220

A lack of proper input validation in the HTTP processing path in TP-Link Archer BE230 v1.2 (web modules) may allow a crafted request to cause the device’s web service to become unresponsive, resulting in a denial of service condition. A network adjacent attacker with high privileges could cause the device’s web interface to temporarily stop responding until it recovers or is rebooted. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_be230_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_be230:1.20:*:*:*:*:*:*:*

History

13 Feb 2026, 19:26

Type Values Removed Values Added
First Time Tp-link
Tp-link archer Be230 Firmware
Tp-link archer Be230
CPE cpe:2.3:h:tp-link:archer_be230:1.20:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_be230_firmware:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.5
References () https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/us/support/faq/4941/ - () https://www.tp-link.com/us/support/faq/4941/ - Vendor Advisory

03 Feb 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 18:16

Updated : 2026-02-13 19:26


NVD link : CVE-2026-22220

Mitre link : CVE-2026-22220

CVE.ORG link : CVE-2026-22220


JSON object : View

Products Affected

tp-link

  • archer_be230
  • archer_be230_firmware
CWE
CWE-20

Improper Input Validation