CVE-2026-22228

An authenticated user with high privileges may trigger a denial‑of‑service condition in TP-Link Archer BE230 v1.2 by restoring a crafted configuration file containing an excessively long parameter. Restoring such a file can cause the device to become unresponsive, requiring a reboot to restore normal operation. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_be230_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_be230:1.20:*:*:*:*:*:*:*

History

13 Feb 2026, 19:25

Type Values Removed Values Added
CPE cpe:2.3:h:tp-link:archer_be230:1.20:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_be230_firmware:*:*:*:*:*:*:*:*
First Time Tp-link
Tp-link archer Be230 Firmware
Tp-link archer Be230
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.9
References () https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/us/support/faq/4941/ - () https://www.tp-link.com/us/support/faq/4941/ - Vendor Advisory

03 Feb 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-03 18:16

Updated : 2026-02-13 19:25


NVD link : CVE-2026-22228

Mitre link : CVE-2026-22228

CVE.ORG link : CVE-2026-22228


JSON object : View

Products Affected

tp-link

  • archer_be230
  • archer_be230_firmware
CWE
CWE-400

Uncontrolled Resource Consumption