CVSS: 8.6EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22229 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2 and Deco BE25 v1.0
https://notcve.org/view.php?id=CVE-2026-22229
02 Feb 2026 — A command injection vulnerability may be exploited after the admin's authentication via the import of a crafted VPN client configuration file on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22227 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2
https://notcve.org/view.php?id=CVE-2026-22227
02 Feb 2026 — A command injection vulnerability may be exploited after the admin's authentication via the configuration backup restoration function of the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each i... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22226 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2
https://notcve.org/view.php?id=CVE-2026-22226
02 Feb 2026 — A command injection vulnerability may be exploited after the admin's authentication in the VPN server configuration module on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is ... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22225 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2 and AXE75 v1.0
https://notcve.org/view.php?id=CVE-2026-22225
02 Feb 2026 — A command injection vulnerability may be exploited after the admin's authentication in the VPN Connection Service on the Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a u... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22224 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2
https://notcve.org/view.php?id=CVE-2026-22224
02 Feb 2026 — A command injection vulnerability may be exploited after the admin's authentication in the cloud communication interface on the TP-Link Archer BE230 v1.2. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tr... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22223 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2
https://notcve.org/view.php?id=CVE-2026-22223
02 Feb 2026 — An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under ... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22222 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2
https://notcve.org/view.php?id=CVE-2026-22222
02 Feb 2026 — An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked und... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-0631 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2
https://notcve.org/view.php?id=CVE-2026-0631
02 Feb 2026 — An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows an adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked ... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-0630 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2 and AXE75 v1.0
https://notcve.org/view.php?id=CVE-2026-0630
02 Feb 2026 — An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(web modules) allows adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked und... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 0CVE-2026-22221 – Command Injection Vulnerability on TP-Link Archer BE230 v1.2
https://notcve.org/view.php?id=CVE-2026-22221
02 Feb 2026 — An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows adjacent authenticated attacker execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under ... • https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
