๐Ÿ” CVE Alert

CVE-2026-22227

UNKNOWN 0.0

Command Injection Vulnerability on TP-Link Archer BE230 v1.2

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

A command injection vulnerability may be exploited after the admin's authentication via the configuration backup restoration function of the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.

CWE CWE-78
Vendor tp-link systems inc.
Product archer be230 v1.2
Published Feb 2, 2026
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for tp-link systems inc. archer be230 v1.2

Be the first to know when new unknown vulnerabilities affecting tp-link systems inc. archer be230 v1.2 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

TP-Link Systems Inc. / Archer BE230 v1.2
0 < 1.2.4 Build 20251218 rel.70420

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
tp-link.com: https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware tp-link.com: https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware tp-link.com: https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware tp-link.com: https://www.tp-link.com/us/support/faq/4935/

Credits

jro