CVE-2026-22228

4.9 MEDIUM

📋 TL;DR

An authenticated high-privilege user can cause a denial-of-service condition in TP-Link Archer BE230 routers by restoring a crafted configuration file with an excessively long parameter. This causes the device to become unresponsive until rebooted. Only TP-Link Archer BE230 v1.2 devices running firmware versions before 1.2.4 Build 20251218 rel.70420 are affected.

💻 Affected Systems

Products:
  • TP-Link Archer BE230
Versions: v1.2 < 1.2.4 Build 20251218 rel.70420
Operating Systems: Embedded router firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects v1.2 hardware revision. Requires authenticated user with configuration restore privileges.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious insider or compromised admin account could repeatedly trigger DoS, causing extended network downtime and requiring physical access to reboot devices.

🟠

Likely Case

Accidental or intentional DoS by authorized users with configuration restore privileges, causing temporary service disruption until manual reboot.

🟢

If Mitigated

Limited to authorized users with configuration restore access, causing temporary disruption that requires physical intervention to resolve.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with configuration restore privileges. Crafting malicious config file is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.4 Build 20251218 rel.70420 or later

Vendor Advisory: https://www.tp-link.com/us/support/faq/4941/

Restart Required: Yes

Instructions:

1. Download latest firmware from TP-Link support site. 2. Log into router admin interface. 3. Navigate to System Tools > Firmware Upgrade. 4. Upload and install the new firmware. 5. Router will reboot automatically.

🔧 Temporary Workarounds

Restrict configuration restore access

all

Limit configuration restore functionality to only essential administrative accounts and monitor usage.

Disable remote admin access

all

Disable remote administration to prevent external exploitation of authenticated access.

🧯 If You Can't Patch

  • Restrict configuration restore privileges to minimal number of trusted administrators
  • Implement monitoring for configuration restore events and investigate anomalies

🔍 How to Verify

Check if Vulnerable:

Check firmware version in router admin interface under Status > Firmware Version. If version is earlier than 1.2.4 Build 20251218 rel.70420, device is vulnerable.

Check Version:

No CLI command available. Check via web interface at Status > Firmware Version.

Verify Fix Applied:

After patching, verify firmware version shows 1.2.4 Build 20251218 rel.70420 or later in admin interface.

📡 Detection & Monitoring

Log Indicators:

  • Configuration restore events followed by device unresponsiveness
  • Multiple failed login attempts to admin interface

Network Indicators:

  • Router becoming unresponsive to ping/management requests
  • Network services dropping after configuration changes

SIEM Query:

Search for events containing 'configuration restore', 'firmware upload', or admin interface access patterns followed by device outage alerts.

🔗 References

📤 Share & Export