Refine your search
8 vulnerabilities found for g611_firmware by tp-link
CVE-2025-7851 (GCVE-0-2025-7851)
Vulnerability from nvd
Published
2025-10-21 00:29
Modified
2025-10-24 17:00
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TP-Link Systems Inc. | Omada gateways |
Version: 0 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-7851",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-21T14:07:19.825502Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T14:07:59.499Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Omada gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Festa gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Omada Pro gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "G36 1.1.4, G611 1.2.2",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Stanislav Dashevskyi and Francesco La Spina of Forescout"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003e\u003cdiv\u003eAn attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.\u003c/div\u003e\u003c/div\u003e"
}
],
"value": "An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-24T17:00:06.753Z",
"orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"shortName": "TPLink"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.omadanetworks.com/en/document/108456/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
},
{
"tags": [
"product"
],
"url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
},
{
"url": "https://www.forescout.com/blog/new-tp-link-router-vulnerabilities-a-primer-on-rooting-routers/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Unauthorized root access via debug functionality",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"assignerShortName": "TPLink",
"cveId": "CVE-2025-7851",
"datePublished": "2025-10-21T00:29:05.809Z",
"dateReserved": "2025-07-18T21:49:12.159Z",
"dateUpdated": "2025-10-24T17:00:06.753Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-7850 (GCVE-0-2025-7850)
Vulnerability from nvd
Published
2025-10-21 00:28
Modified
2025-10-24 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TP-Link Systems Inc. | Omada gateways |
Version: 0 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-7850",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-21T14:09:38.276316Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T14:10:11.876Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Omada gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Festa gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Omada Pro gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "G36 1.1.4, G611 1.2.2",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Stanislav Dashevskyi and Francesco La Spina of Forescout"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003eA command injection vulnerability may be exploited after the admin\u0027s authentication on the web portal on Omada gateways.\u003cbr\u003e\u003c/div\u003e"
}
],
"value": "A command injection vulnerability may be exploited after the admin\u0027s authentication on the web portal on Omada gateways."
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "ADJACENT",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-24T16:59:25.310Z",
"orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"shortName": "TPLink"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.omadanetworks.com/en/document/108456/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
},
{
"tags": [
"product"
],
"url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
},
{
"url": "https://www.forescout.com/blog/new-tp-link-router-vulnerabilities-a-primer-on-rooting-routers/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated OS command execution",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"assignerShortName": "TPLink",
"cveId": "CVE-2025-7850",
"datePublished": "2025-10-21T00:28:11.589Z",
"dateReserved": "2025-07-18T21:49:10.486Z",
"dateUpdated": "2025-10-24T16:59:25.310Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6542 (GCVE-0-2025-6542)
Vulnerability from nvd
Published
2025-10-21 00:23
Modified
2025-10-21 14:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
An arbitrary OS command may be executed on the product by a remote unauthenticated attacker.
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TP-Link Systems Inc. | Omada gateways |
Version: 0 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6542",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-21T14:14:50.370895Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T14:15:13.774Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Omada gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Festa gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Omada Pro gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "G36 1.1.4, G611 1.2.2",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An arbitrary OS command may be executed on the product by a remote unauthenticated attacker."
}
],
"value": "An arbitrary OS command may be executed on the product by a remote unauthenticated attacker."
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T01:16:09.887Z",
"orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"shortName": "TPLink"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.omadanetworks.com/en/document/108455/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
},
{
"tags": [
"product"
],
"url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "OS command injection in multiple parameters",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"assignerShortName": "TPLink",
"cveId": "CVE-2025-6542",
"datePublished": "2025-10-21T00:23:08.908Z",
"dateReserved": "2025-06-23T17:48:10.419Z",
"dateUpdated": "2025-10-21T14:15:13.774Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6541 (GCVE-0-2025-6541)
Vulnerability from nvd
Published
2025-10-21 00:21
Modified
2025-10-21 13:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
An arbitrary OS command may be executed on the product by the user who can log in to the web management interface.
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TP-Link Systems Inc. | Omada gateways |
Version: 0 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6541",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-21T13:56:36.534414Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T13:57:51.728Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Omada gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Festa gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Omada Pro gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "G36 1.1.4, G611 1.2.2",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An arbitrary OS command may be executed on the product by the user who can log in to the web management interface."
}
],
"value": "An arbitrary OS command may be executed on the product by the user who can log in to the web management interface."
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T00:21:42.535Z",
"orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"shortName": "TPLink"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.omadanetworks.com/en/document/108455/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
},
{
"tags": [
"product"
],
"url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "OS command injection using information obtained from the web management interface",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"assignerShortName": "TPLink",
"cveId": "CVE-2025-6541",
"datePublished": "2025-10-21T00:21:42.535Z",
"dateReserved": "2025-06-23T17:48:07.425Z",
"dateUpdated": "2025-10-21T13:57:51.728Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-7851 (GCVE-0-2025-7851)
Vulnerability from cvelistv5
Published
2025-10-21 00:29
Modified
2025-10-24 17:00
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TP-Link Systems Inc. | Omada gateways |
Version: 0 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-7851",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-21T14:07:19.825502Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T14:07:59.499Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Omada gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Festa gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Omada Pro gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "G36 1.1.4, G611 1.2.2",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Stanislav Dashevskyi and Francesco La Spina of Forescout"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003e\u003cdiv\u003eAn attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.\u003c/div\u003e\u003c/div\u003e"
}
],
"value": "An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-24T17:00:06.753Z",
"orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"shortName": "TPLink"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.omadanetworks.com/en/document/108456/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
},
{
"tags": [
"product"
],
"url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
},
{
"url": "https://www.forescout.com/blog/new-tp-link-router-vulnerabilities-a-primer-on-rooting-routers/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Unauthorized root access via debug functionality",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"assignerShortName": "TPLink",
"cveId": "CVE-2025-7851",
"datePublished": "2025-10-21T00:29:05.809Z",
"dateReserved": "2025-07-18T21:49:12.159Z",
"dateUpdated": "2025-10-24T17:00:06.753Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-7850 (GCVE-0-2025-7850)
Vulnerability from cvelistv5
Published
2025-10-21 00:28
Modified
2025-10-24 16:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TP-Link Systems Inc. | Omada gateways |
Version: 0 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-7850",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-21T14:09:38.276316Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T14:10:11.876Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Omada gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Festa gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Omada Pro gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "G36 1.1.4, G611 1.2.2",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Stanislav Dashevskyi and Francesco La Spina of Forescout"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cdiv\u003eA command injection vulnerability may be exploited after the admin\u0027s authentication on the web portal on Omada gateways.\u003cbr\u003e\u003c/div\u003e"
}
],
"value": "A command injection vulnerability may be exploited after the admin\u0027s authentication on the web portal on Omada gateways."
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "ADJACENT",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-24T16:59:25.310Z",
"orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"shortName": "TPLink"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.omadanetworks.com/en/document/108456/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
},
{
"tags": [
"product"
],
"url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
},
{
"url": "https://www.forescout.com/blog/new-tp-link-router-vulnerabilities-a-primer-on-rooting-routers/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated OS command execution",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"assignerShortName": "TPLink",
"cveId": "CVE-2025-7850",
"datePublished": "2025-10-21T00:28:11.589Z",
"dateReserved": "2025-07-18T21:49:10.486Z",
"dateUpdated": "2025-10-24T16:59:25.310Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6542 (GCVE-0-2025-6542)
Vulnerability from cvelistv5
Published
2025-10-21 00:23
Modified
2025-10-21 14:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
An arbitrary OS command may be executed on the product by a remote unauthenticated attacker.
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TP-Link Systems Inc. | Omada gateways |
Version: 0 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6542",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-21T14:14:50.370895Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T14:15:13.774Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Omada gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Festa gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Omada Pro gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "G36 1.1.4, G611 1.2.2",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An arbitrary OS command may be executed on the product by a remote unauthenticated attacker."
}
],
"value": "An arbitrary OS command may be executed on the product by a remote unauthenticated attacker."
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T01:16:09.887Z",
"orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"shortName": "TPLink"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.omadanetworks.com/en/document/108455/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
},
{
"tags": [
"product"
],
"url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "OS command injection in multiple parameters",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"assignerShortName": "TPLink",
"cveId": "CVE-2025-6542",
"datePublished": "2025-10-21T00:23:08.908Z",
"dateReserved": "2025-06-23T17:48:10.419Z",
"dateUpdated": "2025-10-21T14:15:13.774Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-6541 (GCVE-0-2025-6541)
Vulnerability from cvelistv5
Published
2025-10-21 00:21
Modified
2025-10-21 13:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
An arbitrary OS command may be executed on the product by the user who can log in to the web management interface.
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| TP-Link Systems Inc. | Omada gateways |
Version: 0 |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-6541",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-21T13:56:36.534414Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T13:57:51.728Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Omada gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Festa gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "FR365 1.1.10, FR205 1.0.3, FR307 1.2.5",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Omada Pro gateways",
"vendor": "TP-Link Systems Inc.",
"versions": [
{
"lessThan": "G36 1.1.4, G611 1.2.2",
"status": "affected",
"version": "0",
"versionType": "Firmware"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "An arbitrary OS command may be executed on the product by the user who can log in to the web management interface."
}
],
"value": "An arbitrary OS command may be executed on the product by the user who can log in to the web management interface."
}
],
"impacts": [
{
"capecId": "CAPEC-88",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-88 OS Command Injection"
}
]
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T00:21:42.535Z",
"orgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"shortName": "TPLink"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://support.omadanetworks.com/en/document/108455/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/all-omada-router/"
},
{
"tags": [
"product"
],
"url": "https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/"
},
{
"tags": [
"product"
],
"url": "https://www.tp-link.com/us/business-networking/soho-festa-gateway/"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "OS command injection using information obtained from the web management interface",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f23511db-6c3e-4e32-a477-6aa17d310630",
"assignerShortName": "TPLink",
"cveId": "CVE-2025-6541",
"datePublished": "2025-10-21T00:21:42.535Z",
"dateReserved": "2025-06-23T17:48:07.425Z",
"dateUpdated": "2025-10-21T13:57:51.728Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}