A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 24 Oct 2025 17:15:00 +0000


Fri, 24 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tp-link:er605_firmware:2.3.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w-4g_firmware:1.2.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w_firmware:1.2.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er707-m2_firmware:1.3.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7206_firmware:2.2.2:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7212pc_firmware:2.1.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7412-m2_firmware:1.1.0:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er8411_firmware:1.3.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr205_firmware:1.0.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr307-m2_firmware:1.2.5:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr365_firmware:1.1.10:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:g36_firmware:1.1.4:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:g611_firmware:1.2.2:-:*:*:*:*:*:*

Thu, 23 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link er605
Tp-link er605 Firmware
Tp-link er706w
Tp-link er706w-4g
Tp-link er706w-4g Firmware
Tp-link er706w Firmware
Tp-link er707-m2
Tp-link er707-m2 Firmware
Tp-link er7206
Tp-link er7206 Firmware
Tp-link er7212pc
Tp-link er7212pc Firmware
Tp-link er7412-m2
Tp-link er7412-m2 Firmware
Tp-link er8411
Tp-link er8411 Firmware
Tp-link fr205
Tp-link fr205 Firmware
Tp-link fr307-m2
Tp-link fr307-m2 Firmware
Tp-link fr365
Tp-link fr365 Firmware
Tp-link g36
Tp-link g36 Firmware
Tp-link g611
Tp-link g611 Firmware
CPEs cpe:2.3:h:tp-link:er605:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er706w-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er706w:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er707-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7212pc:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7412-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er8411:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr205:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr307-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr365:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:g36:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:g611:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er605_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er707-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7206_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7212pc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7412-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er8411_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr205_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr307-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr365_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:g36_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:g611_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link er605
Tp-link er605 Firmware
Tp-link er706w
Tp-link er706w-4g
Tp-link er706w-4g Firmware
Tp-link er706w Firmware
Tp-link er707-m2
Tp-link er707-m2 Firmware
Tp-link er7206
Tp-link er7206 Firmware
Tp-link er7212pc
Tp-link er7212pc Firmware
Tp-link er7412-m2
Tp-link er7412-m2 Firmware
Tp-link er8411
Tp-link er8411 Firmware
Tp-link fr205
Tp-link fr205 Firmware
Tp-link fr307-m2
Tp-link fr307-m2 Firmware
Tp-link fr365
Tp-link fr365 Firmware
Tp-link g36
Tp-link g36 Firmware
Tp-link g611
Tp-link g611 Firmware
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Tue, 21 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link omada Gateways
Vendors & Products Tp-link
Tp-link omada Gateways

Tue, 21 Oct 2025 00:45:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
Title Authenticated OS command execution
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2025-10-24T16:59:25.310Z

Reserved: 2025-07-18T21:49:10.486Z

Link: CVE-2025-7850

cve-icon Vulnrichment

Updated: 2025-10-21T14:10:00.784Z

cve-icon NVD

Status : Modified

Published: 2025-10-21T01:15:37.193

Modified: 2025-10-24T17:15:43.243

Link: CVE-2025-7850

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-21T09:39:29Z

Weaknesses