A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
History

Fri, 24 Oct 2025 17:15:00 +0000


Fri, 24 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tp-link:er605_firmware:2.3.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w-4g_firmware:1.2.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w_firmware:1.2.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er707-m2_firmware:1.3.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7206_firmware:2.2.2:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7212pc_firmware:2.1.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7412-m2_firmware:1.1.0:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er8411_firmware:1.3.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr205_firmware:1.0.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr307-m2_firmware:1.2.5:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr365_firmware:1.1.10:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:g36_firmware:1.1.4:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:g611_firmware:1.2.2:-:*:*:*:*:*:*

Thu, 23 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link er605
Tp-link er605 Firmware
Tp-link er706w
Tp-link er706w-4g
Tp-link er706w-4g Firmware
Tp-link er706w Firmware
Tp-link er707-m2
Tp-link er707-m2 Firmware
Tp-link er7206
Tp-link er7206 Firmware
Tp-link er7212pc
Tp-link er7212pc Firmware
Tp-link er7412-m2
Tp-link er7412-m2 Firmware
Tp-link er8411
Tp-link er8411 Firmware
Tp-link fr205
Tp-link fr205 Firmware
Tp-link fr307-m2
Tp-link fr307-m2 Firmware
Tp-link fr365
Tp-link fr365 Firmware
Tp-link g36
Tp-link g36 Firmware
Tp-link g611
Tp-link g611 Firmware
CPEs cpe:2.3:h:tp-link:er605:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er706w-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er706w:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er707-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7212pc:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7412-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er8411:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr205:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr307-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr365:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:g36:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:g611:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er605_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er707-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7206_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7212pc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7412-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er8411_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr205_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr307-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr365_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:g36_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:g611_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link er605
Tp-link er605 Firmware
Tp-link er706w
Tp-link er706w-4g
Tp-link er706w-4g Firmware
Tp-link er706w Firmware
Tp-link er707-m2
Tp-link er707-m2 Firmware
Tp-link er7206
Tp-link er7206 Firmware
Tp-link er7212pc
Tp-link er7212pc Firmware
Tp-link er7412-m2
Tp-link er7412-m2 Firmware
Tp-link er8411
Tp-link er8411 Firmware
Tp-link fr205
Tp-link fr205 Firmware
Tp-link fr307-m2
Tp-link fr307-m2 Firmware
Tp-link fr365
Tp-link fr365 Firmware
Tp-link g36
Tp-link g36 Firmware
Tp-link g611
Tp-link g611 Firmware
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


Tue, 21 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link omada Gateways
Vendors & Products Tp-link
Tp-link omada Gateways

Tue, 21 Oct 2025 00:45:00 +0000

Type Values Removed Values Added
Description A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
Title Authenticated OS command execution
Weaknesses CWE-78
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published: 2025-10-21T00:28:11.589Z

Updated: 2025-10-24T16:59:25.310Z

Reserved: 2025-07-18T21:49:10.486Z

Link: CVE-2025-7850

cve-icon Vulnrichment

Updated: 2025-10-21T14:10:00.784Z

cve-icon NVD

Status : Modified

Published: 2025-10-21T01:15:37.193

Modified: 2025-10-24T17:15:43.243

Link: CVE-2025-7850

cve-icon Redhat

No data.