Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-22223
Analyzed
More InfoOfficial Page
Source-f23511db-6c3e-4e32-a477-6aa17d310630
View Known Exploited Vulnerability (KEV) details
Published At-02 Feb, 2026 | 18:16
Updated At-06 Feb, 2026 | 18:34

An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary4.08.5HIGH
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Primary3.18.0HIGH
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 4.0
Base score: 8.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Type: Primary
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CPE Matches

TP-Link Systems Inc.
tp-link
>>archer_be230_firmware>>Versions before 1.2.4(exclusive)
cpe:2.3:o:tp-link:archer_be230_firmware:*:*:*:*:*:*:*:*
TP-Link Systems Inc.
tp-link
>>archer_be230>>1.20
cpe:2.3:h:tp-link:archer_be230:1.20:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Secondaryf23511db-6c3e-4e32-a477-6aa17d310630
CWE ID: CWE-78
Type: Secondary
Source: f23511db-6c3e-4e32-a477-6aa17d310630
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmwaref23511db-6c3e-4e32-a477-6aa17d310630
Product
https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmwaref23511db-6c3e-4e32-a477-6aa17d310630
Product
https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmwaref23511db-6c3e-4e32-a477-6aa17d310630
Product
https://www.tp-link.com/us/support/faq/4935/f23511db-6c3e-4e32-a477-6aa17d310630
Vendor Advisory
Patch
Hyperlink: https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware
Source: f23511db-6c3e-4e32-a477-6aa17d310630
Resource:
Product
Hyperlink: https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware
Source: f23511db-6c3e-4e32-a477-6aa17d310630
Resource:
Product
Hyperlink: https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware
Source: f23511db-6c3e-4e32-a477-6aa17d310630
Resource:
Product
Hyperlink: https://www.tp-link.com/us/support/faq/4935/
Source: f23511db-6c3e-4e32-a477-6aa17d310630
Resource:
Vendor Advisory
Patch
Change History
0Changes found

Details not found