Impact
An OS Command Injection vulnerability in the VPN modules of the TP‑Link Archer BE230 allows an attacker who has authenticated access to execute arbitrary shell commands on the device. Successful exploitation results in full administrative control, undermining configuration integrity, network security, and service availability.
Affected Systems
TP‑Link Archer BE230 routers running firmware v1.20 and versions earlier than 1.2.4 (Build 20251218 rel.70420). The affected product is the Archer BE230 v1.2 as listed by TP‑Link System Inc.
Risk and Exploitability
The vulnerability carries a CVSS score of 8.5, indicating a high severity rating. The EPSS score is below 1%, suggesting a low likelihood of active exploitation at present, and the issue is not catalogued in CISA’s KEV. Exploitation requires authenticated access, likely through the VPN interface, so privileged local or network access is needed to leverage the flaw. Once executed, an attacker can gain unrestricted command execution.
OpenCVE Enrichment