Refine your search

8 vulnerabilities found for er605_firmware by tp-link

CVE-2025-7851 (GCVE-0-2025-7851)
Vulnerability from nvd
Published
2025-10-21 00:29
Modified
2025-10-24 17:00
Summary
An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7851",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-21T14:07:19.825502Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-269",
                "description": "CWE-269 Improper Privilege Management",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T14:07:59.499Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Omada gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Festa gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Omada Pro gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "G36 1.1.4, G611 1.2.2",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Stanislav Dashevskyi and Francesco La Spina of Forescout"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cdiv\u003eAn attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.\u003c/div\u003e\u003c/div\u003e"
            }
          ],
          "value": "An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "HIGH",
            "attackRequirements": "PRESENT",
            "attackVector": "ADJACENT",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "LOW",
            "subIntegrityImpact": "LOW",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-24T17:00:06.753Z",
        "orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
        "shortName": "TPLink"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.omadanetworks.com/en/document/108456/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
        },
        {
          "url": "https://www.forescout.com/blog/new-tp-link-router-vulnerabilities-a-primer-on-rooting-routers/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Unauthorized root access via debug functionality",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
    "assignerShortName": "TPLink",
    "cveId": "CVE-2025-7851",
    "datePublished": "2025-10-21T00:29:05.809Z",
    "dateReserved": "2025-07-18T21:49:12.159Z",
    "dateUpdated": "2025-10-24T17:00:06.753Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-7850 (GCVE-0-2025-7850)
Vulnerability from nvd
Published
2025-10-21 00:28
Modified
2025-10-24 16:59
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7850",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-21T14:09:38.276316Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T14:10:11.876Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Omada gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Festa gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Omada Pro gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "G36 1.1.4, G611 1.2.2",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Stanislav Dashevskyi and Francesco La Spina of Forescout"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003eA command injection vulnerability may be exploited after the admin\u0027s authentication on the web portal on Omada gateways.\u003cbr\u003e\u003c/div\u003e"
            }
          ],
          "value": "A command injection vulnerability may be exploited after the admin\u0027s authentication on the web portal on Omada gateways."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "ADJACENT",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "LOW",
            "subIntegrityImpact": "LOW",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-24T16:59:25.310Z",
        "orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
        "shortName": "TPLink"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.omadanetworks.com/en/document/108456/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
        },
        {
          "url": "https://www.forescout.com/blog/new-tp-link-router-vulnerabilities-a-primer-on-rooting-routers/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Authenticated OS command execution",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
    "assignerShortName": "TPLink",
    "cveId": "CVE-2025-7850",
    "datePublished": "2025-10-21T00:28:11.589Z",
    "dateReserved": "2025-07-18T21:49:10.486Z",
    "dateUpdated": "2025-10-24T16:59:25.310Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-6542 (GCVE-0-2025-6542)
Vulnerability from nvd
Published
2025-10-21 00:23
Modified
2025-10-21 14:15
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
An arbitrary OS command may be executed on the product by a remote unauthenticated attacker.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-6542",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-21T14:14:50.370895Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T14:15:13.774Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Omada gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Festa gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Omada Pro gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "G36 1.1.4, G611 1.2.2",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An arbitrary OS command may be executed on the product by a remote unauthenticated attacker."
            }
          ],
          "value": "An arbitrary OS command may be executed on the product by a remote unauthenticated attacker."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-21T01:16:09.887Z",
        "orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
        "shortName": "TPLink"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.omadanetworks.com/en/document/108455/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "OS command injection in multiple parameters",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
    "assignerShortName": "TPLink",
    "cveId": "CVE-2025-6542",
    "datePublished": "2025-10-21T00:23:08.908Z",
    "dateReserved": "2025-06-23T17:48:10.419Z",
    "dateUpdated": "2025-10-21T14:15:13.774Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-6541 (GCVE-0-2025-6541)
Vulnerability from nvd
Published
2025-10-21 00:21
Modified
2025-10-21 13:57
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
An arbitrary OS command may be executed on the product by the user who can log in to the web management interface.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-6541",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-21T13:56:36.534414Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T13:57:51.728Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Omada gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Festa gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Omada Pro gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "G36 1.1.4, G611 1.2.2",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An arbitrary OS command may be executed on the product by the user who can log in to the web management interface."
            }
          ],
          "value": "An arbitrary OS command may be executed on the product by the user who can log in to the web management interface."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-21T00:21:42.535Z",
        "orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
        "shortName": "TPLink"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.omadanetworks.com/en/document/108455/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "OS command injection using information obtained from the web management interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
    "assignerShortName": "TPLink",
    "cveId": "CVE-2025-6541",
    "datePublished": "2025-10-21T00:21:42.535Z",
    "dateReserved": "2025-06-23T17:48:07.425Z",
    "dateUpdated": "2025-10-21T13:57:51.728Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-7851 (GCVE-0-2025-7851)
Vulnerability from cvelistv5
Published
2025-10-21 00:29
Modified
2025-10-24 17:00
Summary
An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7851",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-21T14:07:19.825502Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-269",
                "description": "CWE-269 Improper Privilege Management",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T14:07:59.499Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Omada gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Festa gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Omada Pro gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "G36 1.1.4, G611 1.2.2",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Stanislav Dashevskyi and Francesco La Spina of Forescout"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003e\u003cdiv\u003eAn attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.\u003c/div\u003e\u003c/div\u003e"
            }
          ],
          "value": "An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways."
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "HIGH",
            "attackRequirements": "PRESENT",
            "attackVector": "ADJACENT",
            "baseScore": 8.7,
            "baseSeverity": "HIGH",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "LOW",
            "subIntegrityImpact": "LOW",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-24T17:00:06.753Z",
        "orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
        "shortName": "TPLink"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.omadanetworks.com/en/document/108456/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
        },
        {
          "url": "https://www.forescout.com/blog/new-tp-link-router-vulnerabilities-a-primer-on-rooting-routers/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Unauthorized root access via debug functionality",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
    "assignerShortName": "TPLink",
    "cveId": "CVE-2025-7851",
    "datePublished": "2025-10-21T00:29:05.809Z",
    "dateReserved": "2025-07-18T21:49:12.159Z",
    "dateUpdated": "2025-10-24T17:00:06.753Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-7850 (GCVE-0-2025-7850)
Vulnerability from cvelistv5
Published
2025-10-21 00:28
Modified
2025-10-24 16:59
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-7850",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-21T14:09:38.276316Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T14:10:11.876Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Omada gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Festa gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Omada Pro gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "G36 1.1.4, G611 1.2.2",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Stanislav Dashevskyi and Francesco La Spina of Forescout"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cdiv\u003eA command injection vulnerability may be exploited after the admin\u0027s authentication on the web portal on Omada gateways.\u003cbr\u003e\u003c/div\u003e"
            }
          ],
          "value": "A command injection vulnerability may be exploited after the admin\u0027s authentication on the web portal on Omada gateways."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "ADJACENT",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "LOW",
            "subIntegrityImpact": "LOW",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-24T16:59:25.310Z",
        "orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
        "shortName": "TPLink"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.omadanetworks.com/en/document/108456/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
        },
        {
          "url": "https://www.forescout.com/blog/new-tp-link-router-vulnerabilities-a-primer-on-rooting-routers/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Authenticated OS command execution",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
    "assignerShortName": "TPLink",
    "cveId": "CVE-2025-7850",
    "datePublished": "2025-10-21T00:28:11.589Z",
    "dateReserved": "2025-07-18T21:49:10.486Z",
    "dateUpdated": "2025-10-24T16:59:25.310Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-6542 (GCVE-0-2025-6542)
Vulnerability from cvelistv5
Published
2025-10-21 00:23
Modified
2025-10-21 14:15
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
An arbitrary OS command may be executed on the product by a remote unauthenticated attacker.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-6542",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-21T14:14:50.370895Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T14:15:13.774Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Omada gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Festa gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Omada Pro gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "G36 1.1.4, G611 1.2.2",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An arbitrary OS command may be executed on the product by a remote unauthenticated attacker."
            }
          ],
          "value": "An arbitrary OS command may be executed on the product by a remote unauthenticated attacker."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "privilegesRequired": "NONE",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-21T01:16:09.887Z",
        "orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
        "shortName": "TPLink"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.omadanetworks.com/en/document/108455/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "OS command injection in multiple parameters",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
    "assignerShortName": "TPLink",
    "cveId": "CVE-2025-6542",
    "datePublished": "2025-10-21T00:23:08.908Z",
    "dateReserved": "2025-06-23T17:48:10.419Z",
    "dateUpdated": "2025-10-21T14:15:13.774Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-6541 (GCVE-0-2025-6541)
Vulnerability from cvelistv5
Published
2025-10-21 00:21
Modified
2025-10-21 13:57
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
An arbitrary OS command may be executed on the product by the user who can log in to the web management interface.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-6541",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-10-21T13:56:36.534414Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-10-21T13:57:51.728Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "Omada gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Festa gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "Omada Pro gateways",
          "vendor": "TP-Link Systems Inc.",
          "versions": [
            {
              "lessThan": "G36 1.1.4, G611 1.2.2",
              "status": "affected",
              "version": "0",
              "versionType": "Firmware"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An arbitrary OS command may be executed on the product by the user who can log in to the web management interface."
            }
          ],
          "value": "An arbitrary OS command may be executed on the product by the user who can log in to the web management interface."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-88",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-88 OS Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "NOT_DEFINED",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "privilegesRequired": "HIGH",
            "providerUrgency": "NOT_DEFINED",
            "subAvailabilityImpact": "NONE",
            "subConfidentialityImpact": "NONE",
            "subIntegrityImpact": "NONE",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-21T00:21:42.535Z",
        "orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
        "shortName": "TPLink"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.omadanetworks.com/en/document/108455/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
        },
        {
          "tags": [
            "product"
          ],
          "url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "OS command injection using information obtained from the web management interface",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
    "assignerShortName": "TPLink",
    "cveId": "CVE-2025-6541",
    "datePublished": "2025-10-21T00:21:42.535Z",
    "dateReserved": "2025-06-23T17:48:07.425Z",
    "dateUpdated": "2025-10-21T13:57:51.728Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}