Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22225: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer BE230 v1.2

0
High
VulnerabilityCVE-2026-22225cvecve-2026-22225cwe-78
Published: Mon Feb 02 2026 (02/02/2026, 17:53:42 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer BE230 v1.2

Description

CVE-2026-22225 is a high-severity OS command injection vulnerability in TP-Link Archer BE230 v1. 2 devices prior to version 1. 2. 4. It requires administrative authentication and affects the VPN Connection Service. Exploitation allows attackers to execute arbitrary OS commands with administrative privileges, potentially leading to full device compromise, including configuration tampering, network security breaches, and service disruption. The vulnerability stems from improper neutralization of special elements in OS commands (CWE-78). Although no known exploits are currently in the wild, the high CVSS score (8. 5) reflects the significant risk. This issue affects devices primarily used in home and small office environments but could impact enterprise networks relying on this hardware.

AI-Powered Analysis

AILast updated: 02/02/2026, 18:30:19 UTC

Technical Analysis

CVE-2026-22225 identifies an OS command injection vulnerability in the TP-Link Archer BE230 v1.2 router's VPN Connection Service. The flaw arises from improper neutralization of special characters in OS commands, classified under CWE-78, allowing an authenticated administrator to inject arbitrary commands into the underlying operating system. This vulnerability is exploitable only after successful administrative authentication, meaning an attacker must first gain admin credentials or access. Upon exploitation, the attacker can execute commands with the highest privilege level on the device, enabling full administrative control. This control can lead to unauthorized changes in device configuration, compromise of network security policies, interception or redirection of network traffic, and denial of service by disrupting router functionality. The affected versions are all prior to firmware 1.2.4 Build 20251218 rel.70420. The CVSS v4.0 score of 8.5 reflects a high severity due to the combination of high impact on confidentiality, integrity, and availability, moderate attack vector (adjacent network), and the requirement for high privileges but no user interaction. No public exploits have been reported yet, but the vulnerability is critical given the widespread use of TP-Link devices and the sensitive role of VPN services in secure communications. This CVE is one of multiple OS command injection issues found in the product, each tracked separately.

Potential Impact

For European organizations, this vulnerability poses a significant risk to network security and operational continuity. Organizations using the Archer BE230 v1.2 routers in their infrastructure, especially for VPN services, could face unauthorized administrative control if attackers obtain admin credentials or exploit weak access controls. This could lead to interception or manipulation of sensitive data, disruption of secure remote access, and potential lateral movement within internal networks. Small and medium enterprises, as well as home offices relying on these devices, may experience service outages or data breaches. The impact extends to critical sectors such as finance, healthcare, and government, where VPNs are essential for secure communications. Given the high CVSS score and the critical nature of the vulnerability, exploitation could severely compromise confidentiality, integrity, and availability of network services. The absence of known exploits reduces immediate risk but does not eliminate the threat, especially if attackers develop targeted exploits.

Mitigation Recommendations

European organizations should prioritize updating affected Archer BE230 v1.2 devices to firmware version 1.2.4 Build 20251218 rel.70420 or later as soon as it becomes available from TP-Link. Until patches are applied, restrict administrative access to the VPN Connection Service by limiting access to trusted IP addresses and enforcing strong, unique administrator passwords. Implement network segmentation to isolate vulnerable devices from critical infrastructure and monitor administrative access logs for suspicious activity. Disable VPN services on affected devices if not required. Employ multi-factor authentication for device management interfaces where possible. Regularly audit device firmware versions and configurations to ensure compliance. Additionally, educate administrators about the risks of credential compromise and enforce strict credential management policies. Consider replacing vulnerable devices with models that have a stronger security posture if patching is delayed or unsupported.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-06T18:18:52.127Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6980e9aef9fa50a62f4f49e2

Added to database: 2/2/2026, 6:15:10 PM

Last enriched: 2/2/2026, 6:30:19 PM

Last updated: 2/2/2026, 8:46:34 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats