Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0654: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Deco BE25 v1.0

0
High
VulnerabilityCVE-2026-0654cvecve-2026-0654cwe-78
Published: Mon Mar 02 2026 (03/02/2026, 17:39:57 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Deco BE25 v1.0

Description

Improper input handling in the administration web interface on TP-Link Deco BE25 v1.0 allows crafted input to be executed as part of an OS command. An authenticated adjacent attacker may execute arbitrary commands via crafted configuration file, impacting confidentiality, integrity and availability of the device. This issue affects Deco BE25 v1.0: through 1.1.1 Build 20250822.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/11/2026, 19:08:39 UTC

Technical Analysis

CVE-2026-0654 is an OS command injection vulnerability identified in the TP-Link Deco BE25 v1.0 wireless mesh router system. The root cause is improper neutralization of special elements in user-supplied input within the device's administration web interface. Specifically, crafted input embedded in configuration files can be executed as part of underlying operating system commands. This vulnerability is classified under CWE-78, indicating that the system fails to properly sanitize or validate input before incorporating it into OS commands. An attacker with authenticated access on an adjacent network can exploit this flaw to execute arbitrary commands with high privileges on the device, potentially leading to full compromise. The vulnerability affects firmware versions through 1.1.1 Build 20250822. The CVSS v4.0 base score is 8.5, reflecting high severity due to the combination of adjacent network attack vector, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are known, the vulnerability poses a significant risk given the device's role in home and small office networks. The lack of a patch link indicates that a fix may not yet be publicly available, underscoring the need for immediate mitigation.

Potential Impact

Successful exploitation of CVE-2026-0654 allows an attacker to execute arbitrary OS commands on the affected TP-Link Deco BE25 device with high privileges. This can lead to full device compromise, enabling attackers to manipulate device configurations, intercept or redirect network traffic, install persistent malware, or disrupt network availability. The breach of confidentiality could expose sensitive network information or user data. Integrity could be compromised through unauthorized configuration changes or firmware tampering. Availability could be impacted by denial-of-service conditions caused by malicious commands. Given the device's role as a network gateway in homes and small offices, exploitation could serve as a foothold for lateral movement into internal networks or as a platform for launching further attacks. The requirement for authenticated adjacent access limits the attack surface but does not eliminate risk, especially in environments with weak authentication or compromised internal users.

Mitigation Recommendations

1. Immediately restrict access to the Deco BE25 administration interface to trusted management networks only, using network segmentation and firewall rules to block adjacent network access from untrusted sources. 2. Enforce strong authentication mechanisms and complex passwords for device administration to reduce the risk of credential compromise. 3. Monitor network traffic and device logs for unusual configuration changes or command execution patterns indicative of exploitation attempts. 4. Disable remote administration features if not required, or restrict them to secure VPN connections. 5. Regularly check TP-Link’s official channels for firmware updates addressing this vulnerability and apply patches promptly once available. 6. Consider deploying network intrusion detection/prevention systems (IDS/IPS) capable of detecting command injection attempts or anomalous administrative activity. 7. Educate users and administrators about the risks of adjacent network attacks and the importance of limiting administrative interface exposure. 8. If possible, implement multi-factor authentication (MFA) for device management to further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-06T18:19:05.133Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a5d050b6c0d8506fbcb7bd

Added to database: 3/2/2026, 6:00:48 PM

Last enriched: 3/11/2026, 7:08:39 PM

Last updated: 4/15/2026, 10:11:58 PM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses