CVE-2026-22228
Unknown Unknown - Not Provided
Denial of Service via Config Restore in TP-Link Archer BE

Publication date: 2026-02-03

Last updated on: 2026-02-13

Assigner: TPLink

Description
An authenticated user with high privileges may trigger a denial‑of‑service condition in TP-Link Archer BE230 v1.2 by restoring a crafted configuration file containing an excessively long parameter. Restoring such a file can cause the device to become unresponsive, requiring a reboot to restore normal operation. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-03
Last Modified
2026-02-13
Generated
2026-05-07
AI Q&A
2026-02-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tp-link archer_be230_firmware to 1.2.4 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


Can you explain this vulnerability to me?

This vulnerability occurs in the TP-Link Archer BE230 v1.2 router where an authenticated user with high privileges can cause a denial-of-service (DoS) condition. This happens by restoring a specially crafted configuration file that contains an excessively long parameter. When this file is restored, the device becomes unresponsive and requires a reboot to return to normal operation.


How can this vulnerability impact me? :

The impact of this vulnerability is that an attacker with high privileges can make the TP-Link Archer BE230 device unresponsive by restoring a malicious configuration file. This denial-of-service condition disrupts normal device operation and requires a manual reboot to recover, potentially causing downtime and loss of network availability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, ensure that your TP-Link Archer BE230 device is updated to version 1.2.4 Build 20251218 rel.70420 or later.

Avoid restoring configuration files that are not verified or that may contain excessively long parameters, as this can trigger a denial-of-service condition.

If the device becomes unresponsive due to this issue, a reboot is required to restore normal operation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart