🔐 CVE Alert

CVE-2026-0630

UNKNOWN 0.0

Command Injection Vulnerability on TP-Link Archer BE230 v1.2 and AXE75 v1.0

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) and Archer AXE75 v1.0 allows adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420 and Archer AXE v1.0 < 1.5.3 Build 20260209 rel. 71108.

CWE CWE-78
Vendor tp-link systems inc.
Product archer be230 v1.2
Published Feb 2, 2026
Last Updated Mar 19, 2026
Stay Ahead of the Next One

Get instant alerts for tp-link systems inc. archer be230 v1.2

Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. archer be230 v1.2 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

TP-Link Systems Inc. / Archer BE230 v1.2
0 < 1.2.4 Build 20251218 rel.70420
TP Link Systems Inc. / AXE75 v1.0
0 < 1.5.3 Build 20260209 rel. 71108

References

NVD ↗ CVE.org ↗ EPSS Data ↗
tp-link.com: https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware tp-link.com: https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware tp-link.com: https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware tp-link.com: https://www.tp-link.com/us/support/faq/4935/ tp-link.com: https://www.tp-link.com/us/support/download/archer-axe75/v1/#Firmware tp-link.com: https://www.tp-link.com/en/support/download/archer-axe75/v1/#Firmware

Credits

jro and caprinuxx Charbel Farhat