Vulnerability Description:
CVE-2025-7850
- A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
CVE-2025-7851
- An attacker may obtain the root shell on the underlying with the restricted conditions on Omada gateways.
Impact:
Attackers may execute arbitrary commands on the device’s underlying operating system.
CVE-2025-7850
CVSS v4.0 Score: 9.3 / Critical
CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H
CVE-2025-7851
CVSS v4.0 Score: 8.7 / High
CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H
Affected Products/Versions and Fixes:
Affected Product Model |
Affected Version |
Fixed Version |
ER8411 |
< 1.3.3 Build 20251013 Rel.44647 |
>= 1.3.3 Build 20251013 Rel.44647 |
ER7412-M2 |
< 1.1.0 Build 20251015 Rel.63594 |
>= 1.1.0 Build 20251015 Rel.63594 |
ER707-M2 |
< 1.3.1 Build 20251009 Rel.67687 |
>= 1.3.1 Build 20251009 Rel.67687 |
ER7206 |
< 2.2.2 Build 20250724 Rel.11109 |
>= 2.2.2 Build 20250724 Rel.11109 |
ER605 |
< 2.3.1 Build 20251015 Rel.78291 |
>= 2.3.1 Build 20251015 Rel.78291 |
ER706W |
< 1.2.1 Build 20250821 Rel.80909 |
>= 1.2.1 Build 20250821 Rel.80909 |
ER706W-4G |
< 1.2.1 Build 20250821 Rel.82492 |
>= 1.2.1 Build 20250821 Rel.82492 |
ER7212PC |
< 2.1.3 Build 20251016 Rel.82571 |
>= 2.1.3 Build 20251016 Rel.82571 |
G36 |
< 1.1.4 Build 20251015 Rel.84206 |
>= 1.1.4 Build 20251015 Rel.84206 |
G611 |
< 1.2.2 Build 20251017 Rel.45512 |
>= 1.2.2 Build 20251017 Rel.45512 |
FR365 |
< 1.1.10 Build 20250626 Rel.81746 |
>= 1.1.10 Build 20250626 Rel.81746 |
FR205 |
< 1.0.3 Build 20251016 Rel.61376 |
>= 1.0.3 Build 20251016 Rel.61376 |
FR307-M2 |
< 1.2.5 Build 20251015 Rel.76743 |
>= 1.2.5 Build 20251015 Rel.76743 |
Recommendation(s):
We strongly recommended that users with the affected device(s) take the following action(s):
- Download and update to the latest firmware to fix the vulnerabilities.
- Change the password after the firmware upgrade to mitigate the potential risk of password leakage.
Disclaimer:
If you do not take the recommended action(s) stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended action(s) in this statement.