CVE-2026-22221

An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_be230_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_be230:1.20:*:*:*:*:*:*:*

History

06 Feb 2026, 18:36

Type Values Removed Values Added
References () https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/us/support/faq/4935/ - () https://www.tp-link.com/us/support/faq/4935/ - Vendor Advisory, Patch
CPE cpe:2.3:h:tp-link:archer_be230:1.20:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_be230_firmware:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.0
First Time Tp-link
Tp-link archer Be230 Firmware
Tp-link archer Be230

02 Feb 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-02 18:16

Updated : 2026-02-06 18:36


NVD link : CVE-2026-22221

Mitre link : CVE-2026-22221

CVE.ORG link : CVE-2026-22221


JSON object : View

Products Affected

tp-link

  • archer_be230
  • archer_be230_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')