Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root
May 15, 2026
Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence
May 15, 2026
79 Chrome Vulnerabilities Patched, Including 14 Critical One’s
May 15, 2026
Home/CyberSecurity News/TP-Link OS Command Injection Flaws Give Attackers Admin
CyberSecurity News

TP-Link OS Command Injection Flaws Give Attackers Admin

Multiple high-severity security flaws affecting TP-Link Archer BE230 Wi-Fi 7 routers have prompted the company to release urgent firmware updates. These vulnerabilities could allow authenticated...

Jennifer sherman
Jennifer sherman
February 5, 2026 2 Min Read
4 0

Multiple high-severity security flaws affecting TP-Link Archer BE230 Wi-Fi 7 routers have prompted the company to release urgent firmware updates.

These vulnerabilities could allow authenticated attackers to execute arbitrary operating system (OS) commands, effectively granting them complete administrative control over the device.

The vulnerabilities affect the Archer BE230 v1.2 model running firmware versions before 1.2.4 Build 20251218 rel.70420.

These span various system components, including VPN modules, cloud communication services, and configuration backup functions.

TP-Link OS Command Injection Vulnerability

The core issue across all reported CVEs is OS Command Injection. This type of vulnerability occurs when an application passes unsafe user-supplied data (such as form data, cookies, or HTTP headers) to a system shell.

In this case, an attacker with high privileges (authenticated access) can inject malicious commands that the router executes with root-level permissions.

CVE ID Component / Module CVSS v4.0 Score
CVE-2026-0630 Web Modules 8.5
CVE-2026-22222 Web Modules 8.5
CVE-2026-0631 VPN Modules 8.5
CVE-2026-22221 VPN Modules 8.5
CVE-2026-22223 VPN Modules 8.5
CVE-2026-22224 Cloud Communication Modules 8.5
CVE-2026-22225 VPN Connection Service 8.5
CVE-2026-22226 VPN Server Config Module 8.5
CVE-2026-22227 Config Backup Restoration 8.5
CVE-2026-22229 Import of Crafted Config File 8.6

While the attack complexity is low (AC:L), it does require the attacker to have high privileges (PR: H).

However, if an attacker has already compromised a weak admin password or hijacked a session, they can use these exploits to escalate from simple management access to complete control of the underlying operating system.

The following table outlines the specific CVEs assigned to these flaws. Note that while they share similar impacts, they represent distinct code paths.

Successful exploitation allows an attacker to manipulate the router’s configuration, intercept network traffic, disrupt services, or use the device as a pivot point to attack other devices on the network.

TP-Link has released a patched firmware version to mitigate these threats. Network administrators and users are strongly advised to update their devices immediately.

Users can download the latest firmware directly from the official TP-Link support pages for their respective regions (US, EN, or SG). Failure to apply these updates leaves the network infrastructure exposed to potential compromise.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

CISA Warns: VMware ESXi 0- Vulnerability Exploited

Next Post

ClickFix Script Uses DNS TXT Records to Run PowerShell Commands

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OpenAI Confirms Security Breach from TanStack npm Attack
May 15, 2026
Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain
May 15, 2026
Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us