An authenticated user with high privileges may trigger a denial‑of‑service condition in TP-Link Archer BE230 v1.2 by restoring a crafted configuration file containing an excessively long parameter. Restoring such a file can cause the device to become unresponsive, requiring a reboot to restore normal operation.
This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link archer Be230 |
|
| Vendors & Products |
Tp-link
Tp-link archer Be230 |
Tue, 03 Feb 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authenticated user with high privileges may trigger a denial‑of‑service condition in TP-Link Archer BE230 v1.2 by restoring a crafted configuration file containing an excessively long parameter. Restoring such a file can cause the device to become unresponsive, requiring a reboot to restore normal operation. This issue affects Archer BE230 v1.2 < 1.2.4 Build 20251218 rel.70420. | |
| Title | Improper Input Validation Leading to DoS on TP-Link Archer BE230 | |
| Weaknesses | CWE-400 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published: 2026-02-03T17:20:34.537Z
Updated: 2026-02-03T17:20:34.537Z
Reserved: 2026-01-06T18:18:52.127Z
Link: CVE-2026-22228
No data.
Status : Received
Published: 2026-02-03T18:16:19.227
Modified: 2026-02-03T18:16:19.227
Link: CVE-2026-22228
No data.