Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22229: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. Archer BE230 v1.2

0
High
VulnerabilityCVE-2026-22229cvecve-2026-22229cwe-78
Published: Mon Feb 02 2026 (02/02/2026, 17:58:32 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Archer BE230 v1.2

Description

A command injection vulnerability may be exploited after the admin's authentication via the import of a crafted VPN client configuration file on the TP-Link Archer BE230 v1.2 and Deco BE25 v1.0. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420 and Deco BE25 v1.0: through 1.1.1 Build 20250822.

AI-Powered Analysis

AILast updated: 03/06/2026, 21:33:07 UTC

Technical Analysis

CVE-2026-22229 is an OS command injection vulnerability classified under CWE-78, discovered in TP-Link Systems Inc.'s Archer BE230 v1.2 and Deco BE25 v1.0 wireless devices. The vulnerability arises from improper neutralization of special elements in the processing of VPN client configuration files imported by an authenticated administrator. When a crafted VPN configuration file is imported, the device's firmware fails to properly sanitize input before passing it to OS command execution functions, allowing an attacker to inject arbitrary commands. This leads to full administrative control over the device, enabling attackers to alter configurations, disrupt network services, or pivot within the network. The affected firmware versions are Archer BE230 v1.2 prior to 1.2.4 Build 20251218 rel.70420 and Deco BE25 v1.0 up to 1.1.1 Build 20250822. The vulnerability does not require user interaction beyond the import action and does not allow exploitation without prior admin authentication, limiting remote exploitation but still posing a significant risk if credentials are compromised. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges required beyond admin, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are known, the vulnerability's nature and impact warrant urgent remediation. This CVE is one of multiple OS command injection issues in these devices, highlighting systemic input validation weaknesses in the firmware.

Potential Impact

The impact of CVE-2026-22229 is severe for organizations deploying affected TP-Link Archer BE230 and Deco BE25 devices. Exploitation grants attackers full administrative control, enabling them to modify device configurations, disable or manipulate network security controls, and disrupt service availability. This can lead to network compromise, data interception, lateral movement within internal networks, and potential persistent backdoors. Organizations relying on these devices for VPN connectivity or network access control face risks of unauthorized access and data breaches. The requirement for admin authentication reduces the risk of remote exploitation by unauthenticated attackers but increases the threat if admin credentials are leaked or weak. The vulnerability could be leveraged in targeted attacks against enterprises, SMBs, or home users using these models, especially in environments where device management is less strictly controlled. The compromise of network edge devices like routers or Wi-Fi extenders can have cascading effects on overall network security posture and trust.

Mitigation Recommendations

To mitigate CVE-2026-22229, organizations should immediately upgrade affected devices to the latest firmware versions where the vulnerability is patched (Archer BE230 v1.2 to version 1.2.4 Build 20251218 rel.70420 or later, and Deco BE25 v1.0 to version 1.1.1 Build 20250822 or later). Until patches are applied, restrict administrative access to trusted personnel only and enforce strong, unique admin passwords to reduce the risk of credential compromise. Disable VPN client configuration imports if not required or implement strict validation and monitoring of imported files. Employ network segmentation to isolate vulnerable devices from critical infrastructure. Monitor device logs for unusual configuration import activities and commands. Consider deploying network intrusion detection systems to detect anomalous traffic patterns indicative of exploitation attempts. Regularly audit device firmware versions and configurations as part of vulnerability management. Vendor communication channels should be monitored for updates or additional advisories related to this and related vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2026-01-06T18:18:52.127Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6980e9aef9fa50a62f4f49f4

Added to database: 2/2/2026, 6:15:10 PM

Last enriched: 3/6/2026, 9:33:07 PM

Last updated: 3/19/2026, 5:16:44 AM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses