Home

Description

An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows an adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.

PUBLISHED Reserved 2026-01-06 | Published 2026-02-02 | Updated 2026-02-03 | Assigner TPLink




HIGH: 8.5CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

Any version before 1.2.4 Build 20251218 rel.70420
affected

Credits

jro finder

References

www.tp-link.com/us/support/download/archer-be230/v1.20/ patch

www.tp-link.com/en/support/download/archer-be230/v1.20/ patch

www.tp-link.com/sg/support/download/archer-be230/v1.20/ patch

www.tp-link.com/us/support/faq/4935/ vendor-advisory

cve.org (CVE-2026-0631)

nvd.nist.gov (CVE-2026-0631)

Download JSON