CVE-2026-22225

7.2 HIGH

📋 TL;DR

This CVE describes a command injection vulnerability in the Archer BE230 router's VPN Connection Service that requires admin authentication. Successful exploitation allows attackers to execute arbitrary commands with administrative privileges, potentially compromising the entire device. Only Archer BE230 v1.2 routers running firmware versions below 1.2.4 Build 20251218 rel.70420 are affected.

💻 Affected Systems

Products:
  • TP-Link Archer BE230
Versions: v1.2 < 1.2.4 Build 20251218 rel.70420
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires admin authentication to exploit. Affects the VPN Connection Service specifically.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attacker to reconfigure network settings, intercept traffic, install persistent backdoors, and use the device as a pivot point into the internal network.

🟠

Likely Case

Unauthorized administrative access leading to VPN configuration changes, credential theft, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if proper network segmentation, strong authentication, and monitoring are in place, though device compromise would still occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires admin credentials but command injection is typically straightforward once authenticated. Multiple similar vulnerabilities exist in different code paths.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.2.4 Build 20251218 rel.70420 or later

Vendor Advisory: https://www.tp-link.com/us/support/faq/4935/

Restart Required: Yes

Instructions:

1. Download firmware from TP-Link support site. 2. Log into router admin interface. 3. Navigate to System Tools > Firmware Upgrade. 4. Upload the firmware file. 5. Wait for upgrade to complete and router to reboot.

🔧 Temporary Workarounds

Disable VPN Service

all

Temporarily disable the VPN Connection Service if not required

Restrict Admin Access

all

Limit admin interface access to specific IP addresses only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate the router from critical systems
  • Enable comprehensive logging and monitoring for suspicious admin activity and command execution attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under System Tools > Firmware Upgrade

Check Version:

Login to router admin interface and navigate to System Tools > Firmware Upgrade

Verify Fix Applied:

Confirm firmware version is 1.2.4 Build 20251218 rel.70420 or later

📡 Detection & Monitoring

Log Indicators:

  • Unusual admin login attempts
  • VPN service restart events
  • Command execution patterns in system logs

Network Indicators:

  • Unexpected VPN configuration changes
  • Unusual outbound connections from router

SIEM Query:

source="router_logs" AND (event="admin_login" OR event="vpn_config_change") AND user!="authorized_admin"

🔗 References

📤 Share & Export