Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 24 Oct 2025 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link er605
Tp-link er605 Firmware Tp-link er706w Tp-link er706w-4g Tp-link er706w-4g Firmware Tp-link er706w Firmware Tp-link er707-m2 Tp-link er707-m2 Firmware Tp-link er7206 Tp-link er7206 Firmware Tp-link er7212pc Tp-link er7212pc Firmware Tp-link er7412-m2 Tp-link er7412-m2 Firmware Tp-link er8411 Tp-link er8411 Firmware Tp-link fr205 Tp-link fr205 Firmware Tp-link fr307-m2 Tp-link fr307-m2 Firmware Tp-link fr365 Tp-link fr365 Firmware Tp-link g36 Tp-link g36 Firmware Tp-link g611 Tp-link g611 Firmware |
|
| CPEs | cpe:2.3:h:tp-link:er605:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:er706w-4g:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:er706w:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:er707-m2:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:er7212pc:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:er7412-m2:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:er8411:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:fr205:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:fr307-m2:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:fr365:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:g36:-:*:*:*:*:*:*:* cpe:2.3:h:tp-link:g611:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:er605_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:er605_firmware:2.3.1:-:*:*:*:*:*:* cpe:2.3:o:tp-link:er706w-4g_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:er706w-4g_firmware:1.2.1:-:*:*:*:*:*:* cpe:2.3:o:tp-link:er706w_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:er706w_firmware:1.2.1:-:*:*:*:*:*:* cpe:2.3:o:tp-link:er707-m2_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:er707-m2_firmware:1.3.1:-:*:*:*:*:*:* cpe:2.3:o:tp-link:er7206_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:er7206_firmware:2.2.2:-:*:*:*:*:*:* cpe:2.3:o:tp-link:er7212pc_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:er7212pc_firmware:2.1.3:-:*:*:*:*:*:* cpe:2.3:o:tp-link:er7412-m2_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:er7412-m2_firmware:1.1.0:-:*:*:*:*:*:* cpe:2.3:o:tp-link:er8411_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:er8411_firmware:1.3.3:-:*:*:*:*:*:* cpe:2.3:o:tp-link:fr205_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:fr205_firmware:1.0.3:-:*:*:*:*:*:* cpe:2.3:o:tp-link:fr307-m2_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:fr307-m2_firmware:1.2.5:-:*:*:*:*:*:* cpe:2.3:o:tp-link:fr365_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:fr365_firmware:1.1.10:-:*:*:*:*:*:* cpe:2.3:o:tp-link:g36_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:g36_firmware:1.1.4:-:*:*:*:*:*:* cpe:2.3:o:tp-link:g611_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:g611_firmware:1.2.2:-:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link er605
Tp-link er605 Firmware Tp-link er706w Tp-link er706w-4g Tp-link er706w-4g Firmware Tp-link er706w Firmware Tp-link er707-m2 Tp-link er707-m2 Firmware Tp-link er7206 Tp-link er7206 Firmware Tp-link er7212pc Tp-link er7212pc Firmware Tp-link er7412-m2 Tp-link er7412-m2 Firmware Tp-link er8411 Tp-link er8411 Firmware Tp-link fr205 Tp-link fr205 Firmware Tp-link fr307-m2 Tp-link fr307-m2 Firmware Tp-link fr365 Tp-link fr365 Firmware Tp-link g36 Tp-link g36 Firmware Tp-link g611 Tp-link g611 Firmware |
|
| Metrics |
cvssV3_1
|
Tue, 21 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Oct 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link festa Gateways Tp-link omada Gateways |
|
| Vendors & Products |
Tp-link
Tp-link festa Gateways Tp-link omada Gateways |
Tue, 21 Oct 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An arbitrary OS command may be executed on the product by the user who can log in to the web management interface. | An arbitrary OS command may be executed on the product by a remote unauthenticated attacker. |
Tue, 21 Oct 2025 00:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An arbitrary OS command may be executed on the product by the user who can log in to the web management interface. | |
| Title | OS command injection in multiple parameters | |
| Weaknesses | CWE-78 | |
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2025-10-21T14:15:13.774Z
Reserved: 2025-06-23T17:48:10.419Z
Link: CVE-2025-6542
Updated: 2025-10-21T14:15:07.995Z
Status : Analyzed
Published: 2025-10-21T01:15:37.063
Modified: 2025-10-24T13:50:10.897
Link: CVE-2025-6542
No data.
OpenCVE Enrichment
Updated: 2025-10-21T09:39:30Z