Description
A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
Published: 2025-10-21
Score: 9.3 Critical
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 24 Oct 2025 17:15:00 +0000


Fri, 24 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tp-link:er605_firmware:2.3.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w-4g_firmware:1.2.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w_firmware:1.2.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er707-m2_firmware:1.3.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7206_firmware:2.2.2:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7212pc_firmware:2.1.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7412-m2_firmware:1.1.0:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er8411_firmware:1.3.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr205_firmware:1.0.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr307-m2_firmware:1.2.5:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr365_firmware:1.1.10:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:g36_firmware:1.1.4:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:g611_firmware:1.2.2:-:*:*:*:*:*:*

Thu, 23 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link er605
Tp-link er605 Firmware
Tp-link er706w
Tp-link er706w-4g
Tp-link er706w-4g Firmware
Tp-link er706w Firmware
Tp-link er707-m2
Tp-link er707-m2 Firmware
Tp-link er7206
Tp-link er7206 Firmware
Tp-link er7212pc
Tp-link er7212pc Firmware
Tp-link er7412-m2
Tp-link er7412-m2 Firmware
Tp-link er8411
Tp-link er8411 Firmware
Tp-link fr205
Tp-link fr205 Firmware
Tp-link fr307-m2
Tp-link fr307-m2 Firmware
Tp-link fr365
Tp-link fr365 Firmware
Tp-link g36
Tp-link g36 Firmware
Tp-link g611
Tp-link g611 Firmware
CPEs cpe:2.3:h:tp-link:er605:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er706w-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er706w:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er707-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7212pc:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7412-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er8411:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr205:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr307-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr365:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:g36:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:g611:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er605_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er707-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7206_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7212pc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7412-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er8411_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr205_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr307-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr365_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:g36_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:g611_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link er605
Tp-link er605 Firmware
Tp-link er706w
Tp-link er706w-4g
Tp-link er706w-4g Firmware
Tp-link er706w Firmware
Tp-link er707-m2
Tp-link er707-m2 Firmware
Tp-link er7206
Tp-link er7206 Firmware
Tp-link er7212pc
Tp-link er7212pc Firmware
Tp-link er7412-m2
Tp-link er7412-m2 Firmware
Tp-link er8411
Tp-link er8411 Firmware
Tp-link fr205
Tp-link fr205 Firmware
Tp-link fr307-m2
Tp-link fr307-m2 Firmware
Tp-link fr365
Tp-link fr365 Firmware
Tp-link g36
Tp-link g36 Firmware
Tp-link g611
Tp-link g611 Firmware
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Tue, 21 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link omada Gateways
Vendors & Products Tp-link
Tp-link omada Gateways

Tue, 21 Oct 2025 00:45:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
Title Authenticated OS command execution
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H'}


Subscriptions

Tp-link Er605 Er605 Firmware Er706w Er706w-4g Er706w-4g Firmware Er706w Firmware Er707-m2 Er707-m2 Firmware Er7206 Er7206 Firmware Er7212pc Er7212pc Firmware Er7412-m2 Er7412-m2 Firmware Er8411 Er8411 Firmware Fr205 Fr205 Firmware Fr307-m2 Fr307-m2 Firmware Fr365 Fr365 Firmware G36 G36 Firmware G611 G611 Firmware Omada Gateways
cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2025-10-24T16:59:25.310Z

Reserved: 2025-07-18T21:49:10.486Z

Link: CVE-2025-7850

cve-icon Vulnrichment

Updated: 2025-10-21T14:10:00.784Z

cve-icon NVD

Status : Modified

Published: 2025-10-21T01:15:37.193

Modified: 2025-10-24T17:15:43.243

Link: CVE-2025-7850

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-21T09:39:29Z

Weaknesses