CVE-2026-22225

A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the Archer BE230 v1.2  and Archer AXE75 v1.0. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420 and Archer AXE v1.0 < 1.5.3 Build 20260209 rel. 71108.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_be230_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_be230:1.20:*:*:*:*:*:*:*

History

19 Mar 2026, 23:16

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad de inyección de comandos puede ser explotada después de la autenticación del administrador en el Servicio de Conexión VPN en el Archer BE230 v1.2. La explotación exitosa podría permitir a un atacante obtener control administrativo total del dispositivo, lo que resultaría en un compromiso grave de la integridad de la configuración, la seguridad de la red y la disponibilidad del servicio. Este CVE cubre uno de varios problemas distintos de inyección de comandos del sistema operativo identificados en rutas de código separadas. Aunque de naturaleza similar, cada instancia se rastrea bajo un ID de CVE único. Este problema afecta a Archer BE230 v1.2 &lt; 1.2.4 Build 20251218 rel.70420.
Summary (en) A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420. (en) A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the Archer BE230 v1.2  and Archer AXE75 v1.0. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420 and Archer AXE v1.0 < 1.5.3 Build 20260209 rel. 71108.
References
  • () https://www.tp-link.com/en/support/download/archer-axe75/v1/#Firmware -
  • () https://www.tp-link.com/us/support/download/archer-axe75/v1/#Firmware -
References () https://www.tp-link.com/us/support/faq/4935/ - Vendor Advisory, Patch () https://www.tp-link.com/us/support/faq/4935/ - Patch, Vendor Advisory

06 Feb 2026, 18:31

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
CPE cpe:2.3:h:tp-link:archer_be230:1.20:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_be230_firmware:*:*:*:*:*:*:*:*
First Time Tp-link
Tp-link archer Be230 Firmware
Tp-link archer Be230
References () https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/us/support/faq/4935/ - () https://www.tp-link.com/us/support/faq/4935/ - Vendor Advisory, Patch

02 Feb 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-02 18:16

Updated : 2026-03-19 23:16


NVD link : CVE-2026-22225

Mitre link : CVE-2026-22225

CVE.ORG link : CVE-2026-22225


JSON object : View

Products Affected

tp-link

  • archer_be230
  • archer_be230_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')