Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22225: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer BE230 v1.2

0
High
VulnerabilityCVE-2026-22225cvecve-2026-22225cwe-78
Published: Mon Feb 02 2026 (02/02/2026, 17:53:42 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer BE230 v1.2

Description

A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the Archer BE230 v1.2  and Archer AXE75 v1.0. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420 and Archer AXE v1.0 < 1.5.3 Build 20260209 rel. 71108.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/20/2026, 01:42:22 UTC

Technical Analysis

CVE-2026-22225 is an OS command injection vulnerability classified under CWE-78, found in TP-Link Systems Inc.'s Archer BE230 v1.2 and Archer AXE75 v1.0 routers. The vulnerability resides in the VPN Connection Service component and can be exploited only after an attacker authenticates as an administrator. The flaw allows improper neutralization of special elements in OS commands, enabling injection of arbitrary commands. This results in the attacker gaining full administrative control over the affected device, compromising configuration integrity, network security, and availability of services. The issue affects firmware versions prior to 1.2.4 Build 20251218 rel.70420 for Archer BE230 and prior to 1.5.3 Build 20260209 rel.71108 for Archer AXE75. The vulnerability is part of multiple distinct OS command injection issues in the product line, each tracked separately. The CVSS v4.0 base score is 8.5, indicating high severity, with attack vector being adjacent network, low attack complexity, no user interaction, and requiring high privileges (admin authentication). The vulnerability impacts confidentiality, integrity, and availability with high scope and impact. No known public exploits have been reported yet, but the potential for severe compromise exists if exploited. The vendor has not yet provided patch links, but updates to fixed firmware versions are expected. This vulnerability highlights the risks of insufficient input validation in network device management interfaces.

Potential Impact

The impact of CVE-2026-22225 is significant for organizations using affected TP-Link Archer BE230 and AXE75 routers. An attacker with administrative credentials can execute arbitrary OS commands, leading to full device compromise. This can result in unauthorized changes to device configuration, interception or manipulation of network traffic, disruption of VPN services, and potential pivoting into internal networks. The compromise of network infrastructure devices undermines overall network security posture and can facilitate further attacks such as data exfiltration, lateral movement, or denial of service. Enterprises relying on these routers for VPN connectivity or perimeter security may face operational disruptions and data breaches. The requirement for admin authentication limits exploitation to insiders or attackers who have already compromised credentials, but the low complexity and high impact make this a critical concern. The vulnerability also poses risks to home users and small businesses using these models, potentially exposing their networks to takeover and misuse.

Mitigation Recommendations

To mitigate CVE-2026-22225, organizations should: 1) Immediately verify the firmware versions of Archer BE230 and AXE75 devices and upgrade to versions 1.2.4 (or later) for BE230 and 1.5.3 (or later) for AXE75 once available from TP-Link. 2) Restrict administrative access to the router management interface and VPN Connection Service to trusted networks and IP addresses only, using network segmentation and firewall rules. 3) Enforce strong, unique administrator passwords and consider multi-factor authentication if supported to reduce risk of credential compromise. 4) Monitor device logs and network traffic for unusual activity indicating attempted or successful exploitation. 5) Disable or limit VPN Connection Service if not required to reduce attack surface. 6) Regularly audit and update device firmware and configurations as part of network security hygiene. 7) Educate administrators on the risks of credential theft and the importance of secure management practices. These steps go beyond generic advice by emphasizing access restrictions, monitoring, and proactive firmware management tailored to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-06T18:18:52.127Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6980e9aef9fa50a62f4f49e2

Added to database: 2/2/2026, 6:15:10 PM

Last enriched: 3/20/2026, 1:42:22 AM

Last updated: 5/3/2026, 12:58:51 AM

Views: 120

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses