Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0630: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer BE230 v1.2

0
High
VulnerabilityCVE-2026-0630cvecve-2026-0630cwe-78
Published: Mon Feb 02 2026 (02/02/2026, 17:48:05 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer BE230 v1.2

Description

An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) and Archer AXE75 v1.0 allows adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420 and Archer AXE v1.0 < 1.5.3 Build 20260209 rel. 71108.

AI-Powered Analysis

AILast updated: 02/27/2026, 07:45:09 UTC

Technical Analysis

CVE-2026-0630 is an OS command injection vulnerability classified under CWE-78, found in the web modules of TP-Link Archer BE230 v1.2 devices before firmware version 1.2.4 (Build 20251218 rel.70420). The vulnerability allows an attacker with adjacent network access and valid authentication credentials to inject and execute arbitrary operating system commands on the device. This occurs due to improper neutralization of special elements in OS commands within the device's web interface code paths. Successful exploitation grants the attacker full administrative privileges, enabling them to alter device configurations, disrupt network services, or pivot to other network assets. The vulnerability is one of several distinct OS command injection flaws identified in the product, each tracked by separate CVEs. The CVSS 4.0 base score is 8.5, reflecting high severity with attack vector as adjacent network, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are known, the potential for severe compromise necessitates prompt mitigation. The flaw primarily affects devices running firmware versions earlier than 1.2.4, emphasizing the importance of timely patching. The requirement for authentication and adjacency limits the attack surface but does not eliminate risk, especially in environments with untrusted internal users or compromised devices.

Potential Impact

The impact of CVE-2026-0630 is significant for organizations deploying TP-Link Archer BE230 v1.2 devices. An attacker exploiting this vulnerability can gain full administrative control over the device, allowing unauthorized changes to network configurations, interception or manipulation of network traffic, and potential denial of service by disrupting device functionality. This can lead to broader network compromise, especially if the device serves as a gateway or critical network component. Confidentiality is at risk as attackers may access sensitive configuration data or intercept communications. Integrity is compromised through unauthorized configuration changes, and availability can be affected by service disruption or device bricking. The requirement for adjacency and authentication reduces the likelihood of remote exploitation but does not eliminate insider threats or lateral movement risks within segmented networks. Organizations relying on these devices for home or small office networks may face increased exposure if network segmentation or access controls are weak. The absence of known exploits in the wild currently limits immediate widespread impact but does not preclude future exploitation attempts.

Mitigation Recommendations

To mitigate CVE-2026-0630, organizations should immediately update affected TP-Link Archer BE230 devices to firmware version 1.2.4 or later, which addresses the vulnerability. If immediate patching is not feasible, restrict access to the device's management interface to trusted administrators only, preferably via a dedicated management VLAN or out-of-band management network. Implement strong authentication mechanisms and monitor for unusual administrative activity. Network segmentation should be enforced to limit adjacency exposure, preventing untrusted devices or users from accessing the management interface. Disable any unnecessary services or remote management features to reduce the attack surface. Regularly audit device configurations and logs for signs of compromise. Additionally, consider deploying network intrusion detection systems capable of identifying suspicious command injection attempts targeting device web interfaces. Vendor communication channels should be monitored for updates or additional patches addressing related vulnerabilities. Finally, educate internal users about the risks of credential compromise and lateral movement within the network.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-06T00:07:44.620Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6980e629f9fa50a62f4dd5fb

Added to database: 2/2/2026, 6:00:09 PM

Last enriched: 2/27/2026, 7:45:09 AM

Last updated: 3/19/2026, 11:00:28 PM

Views: 501

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses