CVE-2026-0631
Published: 02 February 2026
Summary
CVE-2026-0631 is a high-severity OS Command Injection (CWE-78) vulnerability in Tp-Link Archer Be230 Firmware. Its CVSS base score is 8.0 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Network Device CLI (T1059.008); ranked at the 25.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly addresses this CVE by requiring timely identification, reporting, and correction of the OS command injection flaw through recommended firmware updates.
Prevents OS command injection by validating and sanitizing untrusted inputs to the vulnerable VPN modules.
Ensures router firmware configuration settings are maintained at the patched version (1.2.4 Build 20251218 rel.70420 or later) to mitigate this specific vulnerability.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection on network device directly enables arbitrary CLI command execution (T1059.008) and facilitates privilege escalation from low-priv auth to full admin control (T1068).
NVD Description
An OS Command Injection vulnerability in TP-Link Archer BE230 v1.2(vpn modules) allows an adjacent authenticated attacker to execute arbitrary code. Successful exploitation could allow an attacker to gain full administrative control of the device, resulting in severe compromise of configuration…
more
integrity, network security, and service availability. This CVE covers one of multiple distinct OS command injection issues identified across separate code paths. Although similar in nature, each instance is tracked under a unique CVE ID.This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Deeper analysisAI
CVE-2026-0631 is an OS command injection vulnerability (CWE-78) in the VPN modules of TP-Link Archer BE230 v1.2 routers. It affects versions prior to 1.2.4 Build 20251218 rel.70420 and was published on 2026-02-02 with a CVSS v3.1 base score of 8.0 (AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H). This issue represents one of multiple distinct OS command injection vulnerabilities identified across separate code paths in the device, with each tracked under a unique CVE ID.
An adjacent authenticated attacker with low privileges can exploit this vulnerability to execute arbitrary operating system commands. Successful exploitation enables the attacker to gain full administrative control of the device, resulting in severe compromise of configuration integrity, network security, and service availability.
TP-Link advisories recommend updating affected Archer BE230 v1.2 devices to version 1.2.4 Build 20251218 rel.70420 or later firmware, available for download from regional support pages including https://www.tp-link.com/en/support/download/archer-be230/v1.20/#Firmware, https://www.tp-link.com/sg/support/download/archer-be230/v1.20/#Firmware, https://www.tp-link.com/us/support/download/archer-be230/v1.20/#Firmware, and https://www.tp-link.com/us/support/faq/4935/.
Details
- CWE(s)