← Volver a CVEs
CVE-2026-22223
HIGH8.0
Descripcion
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Detalles CVE
Puntuacion CVSS v3.18.0
SeveridadHIGH
Vector CVSSCVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueADJACENT_NETWORK
ComplejidadLOW
Privilegios requeridosLOW
Interaccion usuarioNONE
Publicado2/2/2026
Ultima modificacion2/6/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
tp-link:archer_be230tp-link:archer_be230_firmware
Debilidades (CWE)
CWE-78
Referencias
https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware(f23511db-6c3e-4e32-a477-6aa17d310630)
https://www.tp-link.com/us/support/faq/4935/(f23511db-6c3e-4e32-a477-6aa17d310630)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.