Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22225: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer BE230 v1.2

0
High
VulnerabilityCVE-2026-22225cvecve-2026-22225cwe-78
Published: Mon Feb 02 2026 (02/02/2026, 17:53:42 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer BE230 v1.2

Description

A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.

AI-Powered Analysis

AILast updated: 02/27/2026, 08:05:29 UTC

Technical Analysis

CVE-2026-22225 identifies an OS command injection vulnerability (CWE-78) in the VPN Connection Service of TP-Link Systems Inc.'s Archer BE230 v1.2 router. The vulnerability manifests after an attacker authenticates as an administrator, exploiting improper neutralization of special characters in input passed to OS commands. This allows execution of arbitrary commands on the underlying operating system with administrative privileges. The affected firmware versions are those prior to 1.2.4 Build 20251218 rel.70420. The vulnerability is one of multiple distinct OS command injection flaws in the product, each tracked separately. The CVSS 4.0 base score is 8.5 (high), reflecting the attack vector as adjacent network, low attack complexity, no user interaction, and high impact on confidentiality, integrity, and availability. Successful exploitation can lead to full device takeover, enabling attackers to alter configurations, disrupt network services, or pivot into internal networks. No known public exploits or active exploitation in the wild have been reported yet. The vulnerability requires administrative credentials, limiting exposure to attackers who have gained or guessed such credentials or have insider access. The flaw underscores the importance of input validation and secure coding practices in embedded device firmware, especially for network management interfaces.

Potential Impact

The impact of CVE-2026-22225 is significant for organizations using the TP-Link Archer BE230 v1.2 router, particularly in environments where the device manages VPN connections and network security. An attacker who gains administrative access can execute arbitrary OS commands, resulting in complete compromise of the device. This can lead to unauthorized changes in network configurations, interception or redirection of network traffic, disruption of VPN services, and potential lateral movement within the internal network. The compromise of network infrastructure devices can undermine overall organizational security posture, exposing sensitive data and critical systems. Given the device's role in VPN connectivity, exploitation could also affect remote access security, impacting business continuity and data confidentiality. Although exploitation requires admin authentication, attackers may leverage weak or default credentials, phishing, or insider threats to gain access. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as proof-of-concept code may emerge. Organizations relying on this device should consider the risk high due to the potential for severe operational and security consequences.

Mitigation Recommendations

To mitigate CVE-2026-22225, organizations should prioritize upgrading the Archer BE230 v1.2 firmware to version 1.2.4 Build 20251218 rel.70420 or later once it is released by TP-Link. Until the patch is applied, restrict administrative access to the device by limiting management interfaces to trusted networks and using strong, unique administrator passwords. Implement multi-factor authentication for device management if supported. Regularly audit and monitor administrative access logs for suspicious activity. Disable or restrict VPN Connection Service features if not required. Employ network segmentation to isolate the device from critical infrastructure and limit the potential impact of compromise. Additionally, conduct vulnerability scanning and penetration testing focused on network devices to detect similar injection flaws. Educate administrators on secure credential management and the risks of exposing management interfaces to untrusted networks. Finally, maintain an incident response plan that includes steps for compromised network devices to minimize damage and recovery time.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-06T18:18:52.127Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6980e9aef9fa50a62f4f49e2

Added to database: 2/2/2026, 6:15:10 PM

Last enriched: 2/27/2026, 8:05:29 AM

Last updated: 3/19/2026, 7:30:27 PM

Views: 75

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses