An arbitrary OS command may be executed on the product by a remote unauthenticated attacker.
History

Fri, 24 Oct 2025 14:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link er605
Tp-link er605 Firmware
Tp-link er706w
Tp-link er706w-4g
Tp-link er706w-4g Firmware
Tp-link er706w Firmware
Tp-link er707-m2
Tp-link er707-m2 Firmware
Tp-link er7206
Tp-link er7206 Firmware
Tp-link er7212pc
Tp-link er7212pc Firmware
Tp-link er7412-m2
Tp-link er7412-m2 Firmware
Tp-link er8411
Tp-link er8411 Firmware
Tp-link fr205
Tp-link fr205 Firmware
Tp-link fr307-m2
Tp-link fr307-m2 Firmware
Tp-link fr365
Tp-link fr365 Firmware
Tp-link g36
Tp-link g36 Firmware
Tp-link g611
Tp-link g611 Firmware
CPEs cpe:2.3:h:tp-link:er605:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er706w-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er706w:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er707-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7212pc:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7412-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er8411:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr205:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr307-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr365:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:g36:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:g611:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er605_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er605_firmware:2.3.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w-4g_firmware:1.2.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w_firmware:1.2.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er707-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er707-m2_firmware:1.3.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7206_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7206_firmware:2.2.2:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7212pc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7212pc_firmware:2.1.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7412-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7412-m2_firmware:1.1.0:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er8411_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er8411_firmware:1.3.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr205_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr205_firmware:1.0.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr307-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr307-m2_firmware:1.2.5:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr365_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr365_firmware:1.1.10:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:g36_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:g36_firmware:1.1.4:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:g611_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:g611_firmware:1.2.2:-:*:*:*:*:*:*
Vendors & Products Tp-link er605
Tp-link er605 Firmware
Tp-link er706w
Tp-link er706w-4g
Tp-link er706w-4g Firmware
Tp-link er706w Firmware
Tp-link er707-m2
Tp-link er707-m2 Firmware
Tp-link er7206
Tp-link er7206 Firmware
Tp-link er7212pc
Tp-link er7212pc Firmware
Tp-link er7412-m2
Tp-link er7412-m2 Firmware
Tp-link er8411
Tp-link er8411 Firmware
Tp-link fr205
Tp-link fr205 Firmware
Tp-link fr307-m2
Tp-link fr307-m2 Firmware
Tp-link fr365
Tp-link fr365 Firmware
Tp-link g36
Tp-link g36 Firmware
Tp-link g611
Tp-link g611 Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 21 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link festa Gateways
Tp-link omada Gateways
Vendors & Products Tp-link
Tp-link festa Gateways
Tp-link omada Gateways

Tue, 21 Oct 2025 01:45:00 +0000

Type Values Removed Values Added
Description An arbitrary OS command may be executed on the product by the user who can log in to the web management interface. An arbitrary OS command may be executed on the product by a remote unauthenticated attacker.

Tue, 21 Oct 2025 00:45:00 +0000

Type Values Removed Values Added
Description An arbitrary OS command may be executed on the product by the user who can log in to the web management interface.
Title OS command injection in multiple parameters
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published: 2025-10-21T00:23:08.908Z

Updated: 2025-10-21T14:15:13.774Z

Reserved: 2025-06-23T17:48:10.419Z

Link: CVE-2025-6542

cve-icon Vulnrichment

Updated: 2025-10-21T14:15:07.995Z

cve-icon NVD

Status : Analyzed

Published: 2025-10-21T01:15:37.063

Modified: 2025-10-24T13:50:10.897

Link: CVE-2025-6542

cve-icon Redhat

No data.