- TP-Link has fixed four Omada gateway vulnerabilities, two of which are rated as code execution critical
- Three of them were command injection errors; one allowed root shell due to improper privilege management
- Several models are affected; one critical flaw does not require authentication to use
Network equipment maker TP-Link has patched four vulnerabilities found in its Omada gateways, including two critical ones that could allow arbitrary code execution.
In a security advisory, TP-Link said three of the four vulnerabilities were due to command injection. The fourth was the flaw of improper privilege management.
Both critical levels are command injection flaws and are tracked as CVE-2025-6542 and CVE-2025-7850, both with a severity rating of 9.3/10. In the latter case, the attacker also needs to have administrator access to the web portal, while in the first case, no authentication is required.
Multiple models affected
Two other vulnerabilities are tracked as CVE-2025-6541 (score 8.6 out of 10) and CVE-2025-7851. The first one can be exploited by users who have access to the web-based management interface, while the second one is a mismanagement of privileges that allows attackers to gain a root shell on the underlying system. operating system.
Several models and product versions are reportedly affected. Here's the whole list:
ER8411 < 1.3.3 Build 20251013 Issue 44647
ER7412-M2 < 1.1.0, Build 20251015, Issue 63594
ER707-M2 < 1.3.1 Build 20251009 Issue 67687
ER7206 < 2.2.2 Build 20250724 Issue 11109
ER605 < 2.3.1 Build 20251015 Issue 78291
ER706W < 1.2.1, build 20250821, release 80909.
ER706W-4G < 1.2.1, build 20250821, issue 82492
ER7212PC < 2.1.3 Build 20251016 Issue 82571
G36 < 1.1.4 Build 20251015 Issue 84206
G611 < 1.2.2 Build 20251017 Issue 45512
FR365 < 1.1.10 Build 20250626 Issue 81746
FR205 < 1.0.3 Build 20251016 Version 61376
FR307-M2 < 1.2.5 Build 20251015 Issue 76743
TP-Link did not specify whether these flaws were used in real-world conditions or not. However, cybercriminals often wait for companies to issue recommendations before attacking, knowing that many organizations rarely implement patches in a timely manner.
By using Hacker news
Follow TechRadar on Google News. And add us as your preferred source to get our expert news, reviews and opinions in your feeds. Be sure to click the “Subscribe” button!
And of course you can also Follow TechRadar on TikTok for news, reviews, unboxing videos and get regular updates from us on whatsapp too much.
The best antivirus for any budget