Security Gaps in TP-Link Devices Expose Users to Full Control Attacks

Home/Cybersecurity, Secuirty Update, Security Advisory, vulnerability, Vulnerability Reports/Security Gaps in TP-Link Devices Expose Users to Full Control Attacks

Security Gaps in TP-Link Devices Expose Users to Full Control Attacks

TP-Link has disclosed multiple serious security flaws in its Archer BE230 v1.2 Wi-Fi router. These vulnerabilities allow attackers with administrative access to run system commands and take complete control of the device.

Security researchers identified nine separate command injection issues affecting different parts of the router software, including web management, VPN services, cloud communication, and configuration features.

What’s the Core Problem?

The router firmware does not properly validate certain inputs. Because of this, attackers can inject malicious operating system commands through authenticated interfaces.

Most of the vulnerabilities require access from the local network with high privileges. However, one flaw can be triggered remotely by importing a specially crafted configuration file, increasing the risk.

What Could Happen?

If exploited, attackers could:

  • Take full administrative control of the router
  • Change network settings
  • Intercept internet traffic
  • Install backdoors for long-term access
  • Move deeper into internal networks

This could affect both home users and organizations using the device.

Affected Versions

Device ModelAffected Firmware VersionsFixed Version
Archer BE230 v1.2All versions before 1.2.4 Build 202512181.2.4 Build 20251218 or later

Vulnerability Overview

CVE IDAffected AreaSeverityAccess Required
CVE-2026-0630Web ModulesHigh (8.5)Adjacent Network
CVE-2026-22222Web ModulesHigh (8.5)Adjacent Network
CVE-2026-0631VPN ModulesHigh (8.5)Adjacent Network
CVE-2026-22221VPN ModulesHigh (8.5)Adjacent Network
CVE-2026-22223VPN ModulesHigh (8.5)Adjacent Network
CVE-2026-22224Cloud CommunicationHigh (8.5)Adjacent Network
CVE-2026-22225VPN Connection ServiceHigh (8.5)Adjacent Network
CVE-2026-22226VPN Server ConfigurationHigh (8.5)Adjacent Network
CVE-2026-22227Configuration BackupHigh (8.5)Adjacent Network
CVE-2026-22229Config File ImportHigh (8.6)Network (Remote)

Fix Available

TP-Link released firmware version 1.2.4 Build 20251218 that fixes all these issues. Users should update immediately through official TP-Link support channels. Devices left unpatched remain at risk.

By | 2026-02-06T14:10:32+05:30 February 5th, 2026|Cybersecurity, Secuirty Update, Security Advisory, vulnerability, Vulnerability Reports|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!