Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0630: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer BE230 v1.2

0
High
VulnerabilityCVE-2026-0630cvecve-2026-0630cwe-78
Published: Mon Feb 02 2026 (02/02/2026, 17:48:05 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer BE230 v1.2

Description

An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) and Archer AXE75 v1.0 allows adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420 and Archer AXE v1.0 < 1.5.3 Build 20260209 rel. 71108.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 01:42:04 UTC

Technical Analysis

CVE-2026-0630 is an OS command injection vulnerability classified under CWE-78, impacting TP-Link Archer BE230 v1.2 and Archer AXE75 v1.0 wireless routers. The flaw resides in the web management modules of these devices, where user-supplied input is improperly sanitized before being incorporated into operating system commands. This improper neutralization allows an adjacent attacker who has authenticated access to the device's management interface to inject arbitrary OS commands. Successful exploitation grants the attacker full administrative privileges on the device, enabling them to alter configurations, disrupt network operations, or pivot to other network assets. The vulnerability affects Archer BE230 versions prior to 1.2.4 (Build 20251218 rel.70420) and Archer AXE v1.0 versions prior to 1.5.3 (Build 20260209 rel.71108). The CVSS 4.0 base score is 8.5, reflecting high severity due to low attack complexity, no user interaction, and the ability to cause significant confidentiality, integrity, and availability impacts. Although no known exploits are publicly reported, the presence of multiple distinct OS command injection vulnerabilities in these devices indicates a systemic issue in input validation within the firmware's web modules. This vulnerability requires adjacent network access and authenticated credentials, limiting remote exploitation but still posing a serious risk in environments where attackers can gain local network access or compromise credentials.

Potential Impact

The impact of CVE-2026-0630 is substantial for organizations deploying affected TP-Link Archer BE230 and AXE75 routers. An attacker exploiting this vulnerability can gain full administrative control over the device, allowing them to modify network configurations, disable security controls, or launch further attacks against internal network resources. This can lead to loss of confidentiality through data interception or manipulation, integrity breaches by altering device settings or firmware, and availability disruptions by disabling network services or causing device failures. In enterprise or critical infrastructure environments, compromised routers can serve as persistent footholds for attackers, enabling lateral movement and data exfiltration. Additionally, since these devices often serve as gateways, their compromise undermines the overall network security posture. The requirement for adjacent network access and authentication somewhat limits the attack surface but does not eliminate risk, especially in environments with weak credential management or insider threats. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future exploitation once details become widely known.

Mitigation Recommendations

To mitigate CVE-2026-0630, organizations should prioritize updating affected TP-Link devices to the latest firmware versions: Archer BE230 v1.2.4 (Build 20251218 rel.70420) or later and Archer AXE v1.0 1.5.3 (Build 20260209 rel.71108) or later once these patches are officially released. Until patches are applied, restrict access to the device management interfaces to trusted network segments and enforce strong authentication mechanisms, including complex passwords and, if supported, multi-factor authentication. Network segmentation should be employed to limit adjacent network access to these devices, minimizing exposure to potential attackers. Monitoring and logging of administrative access attempts and unusual device behavior can help detect exploitation attempts early. Disable any unnecessary services or remote management features that increase the attack surface. Additionally, conduct regular audits of device configurations and credentials to ensure no unauthorized changes or access have occurred. Vendors and administrators should also review and harden input validation mechanisms in custom device management interfaces to prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-06T00:07:44.620Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6980e629f9fa50a62f4dd5fb

Added to database: 2/2/2026, 6:00:09 PM

Last enriched: 3/20/2026, 1:42:04 AM

Last updated: 5/3/2026, 4:55:18 PM

Views: 565

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses