An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.
History

Fri, 24 Oct 2025 17:15:00 +0000


Fri, 24 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:o:tp-link:er605_firmware:2.3.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w-4g_firmware:1.2.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w_firmware:1.2.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er707-m2_firmware:1.3.1:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7206_firmware:2.2.2:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7212pc_firmware:2.1.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7412-m2_firmware:1.1.0:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:er8411_firmware:1.3.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr205_firmware:1.0.3:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr307-m2_firmware:1.2.5:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr365_firmware:1.1.10:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:g36_firmware:1.1.4:-:*:*:*:*:*:*
cpe:2.3:o:tp-link:g611_firmware:1.2.2:-:*:*:*:*:*:*

Thu, 23 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link er605
Tp-link er605 Firmware
Tp-link er706w
Tp-link er706w-4g
Tp-link er706w-4g Firmware
Tp-link er706w Firmware
Tp-link er707-m2
Tp-link er707-m2 Firmware
Tp-link er7206
Tp-link er7206 Firmware
Tp-link er7212pc
Tp-link er7212pc Firmware
Tp-link er7412-m2
Tp-link er7412-m2 Firmware
Tp-link er8411
Tp-link er8411 Firmware
Tp-link fr205
Tp-link fr205 Firmware
Tp-link fr307-m2
Tp-link fr307-m2 Firmware
Tp-link fr365
Tp-link fr365 Firmware
Tp-link g36
Tp-link g36 Firmware
Tp-link g611
Tp-link g611 Firmware
CPEs cpe:2.3:h:tp-link:er605:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er706w-4g:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er706w:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er707-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7212pc:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er7412-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:er8411:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr205:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr307-m2:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:fr365:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:g36:-:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:g611:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er605_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w-4g_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er706w_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er707-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7206_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7212pc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er7412-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:er8411_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr205_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr307-m2_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:fr365_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:g36_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:g611_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link er605
Tp-link er605 Firmware
Tp-link er706w
Tp-link er706w-4g
Tp-link er706w-4g Firmware
Tp-link er706w Firmware
Tp-link er707-m2
Tp-link er707-m2 Firmware
Tp-link er7206
Tp-link er7206 Firmware
Tp-link er7212pc
Tp-link er7212pc Firmware
Tp-link er7412-m2
Tp-link er7412-m2 Firmware
Tp-link er8411
Tp-link er8411 Firmware
Tp-link fr205
Tp-link fr205 Firmware
Tp-link fr307-m2
Tp-link fr307-m2 Firmware
Tp-link fr365
Tp-link fr365 Firmware
Tp-link g36
Tp-link g36 Firmware
Tp-link g611
Tp-link g611 Firmware
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 21 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 21 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link omada Gateways
Vendors & Products Tp-link
Tp-link omada Gateways

Tue, 21 Oct 2025 00:45:00 +0000

Type Values Removed Values Added
Description An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.
Title Unauthorized root access via debug functionality
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published: 2025-10-21T00:29:05.809Z

Updated: 2025-10-24T17:00:06.753Z

Reserved: 2025-07-18T21:49:12.159Z

Link: CVE-2025-7851

cve-icon Vulnrichment

Updated: 2025-10-21T14:07:56.106Z

cve-icon NVD

Status : Modified

Published: 2025-10-21T01:15:37.330

Modified: 2025-10-24T17:15:43.390

Link: CVE-2025-7851

cve-icon Redhat

No data.