CVE-2026-22229

A command injection vulnerability may be exploited after the admin's authentication via the import of a crafted VPN client configuration file on the TP-Link Archer BE230 v1.2 and Deco BE25 v1.0. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420 and Deco BE25 v1.0: through 1.1.1 Build 20250822.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:archer_be230_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:archer_be230:1.20:*:*:*:*:*:*:*

History

02 Mar 2026, 18:16

Type Values Removed Values Added
References
  • () https://www.tp-link.com/en/support/download/deco-be25/#Firmware -
  • () https://www.tp-link.com/sg/support/download/deco-be25/#Firmware -
  • () https://www.tp-link.com/us/support/download/deco-be25/v1/#Firmware -
References () https://www.tp-link.com/us/support/faq/4935/ - Vendor Advisory, Patch () https://www.tp-link.com/us/support/faq/4935/ - Patch, Vendor Advisory
Summary
  • (es) Una vulnerabilidad de inyección de comandos puede ser explotada después de la autenticación del administrador mediante la importación de un archivo de configuración de cliente VPN manipulado en el TP-Link Archer BE230 v1.2. La explotación exitosa podría permitir a un atacante obtener control administrativo total del dispositivo, lo que resultaría en un compromiso grave de la integridad de la configuración, la seguridad de la red y la disponibilidad del servicio. Este CVE cubre uno de varios problemas distintos de inyección de comandos del sistema operativo identificados en rutas de código separadas. Aunque de naturaleza similar, cada instancia se rastrea bajo un ID de CVE único. Este problema afecta a Archer BE230 v1.2 &lt; 1.2.4 Build 20251218 rel.70420.
Summary (en) A command injection vulnerability may be exploited after the admin's authentication via the import of a crafted VPN client configuration file on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420. (en) A command injection vulnerability may be exploited after the admin's authentication via the import of a crafted VPN client configuration file on the TP-Link Archer BE230 v1.2 and Deco BE25 v1.0. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420 and Deco BE25 v1.0: through 1.1.1 Build 20250822.

06 Feb 2026, 18:29

Type Values Removed Values Added
CPE cpe:2.3:h:tp-link:archer_be230:1.20:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:archer_be230_firmware:*:*:*:*:*:*:*:*
References () https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware - () https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware - Product
References () https://www.tp-link.com/us/support/faq/4935/ - () https://www.tp-link.com/us/support/faq/4935/ - Vendor Advisory, Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2
First Time Tp-link
Tp-link archer Be230 Firmware
Tp-link archer Be230

02 Feb 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-02 18:16

Updated : 2026-03-02 18:16


NVD link : CVE-2026-22229

Mitre link : CVE-2026-22229

CVE.ORG link : CVE-2026-22229


JSON object : View

Products Affected

tp-link

  • archer_be230
  • archer_be230_firmware
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')