🔐 CVE Alert

CVE-2026-22221

UNKNOWN 0.0

Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.

CWE CWE-78
Vendor tp-link systems inc.
Product archer be230 v1.2
Published Feb 2, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for tp-link systems inc. archer be230 v1.2

Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. archer be230 v1.2 are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

TP-Link Systems Inc. / Archer BE230 v1.2
0 < 1.2.4 Build 20251218 rel.70420

References

NVD ↗ CVE.org ↗ EPSS Data ↗
tp-link.com: https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware tp-link.com: https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware tp-link.com: https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware tp-link.com: https://www.tp-link.com/us/support/faq/4935/

Credits

jro and caprinuxx