• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
tp link patches four omada gateway flaws, two allow remote code

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution

You are here: Home / General Cyber Security News / TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution
October 22, 2025

TP-Link has released security updates to address four security flaws impacting Omada gateway devices, including two critical bugs that could result in arbitrary code execution.

The vulnerabilities in question are listed below –

  • CVE-2025-6541 (CVSS score: 8.6) – An operating system command injection vulnerability that could be exploited by an attacker who can log in to the web management interface to run arbitrary commands
  • CVE-2025-6542 (CVSS score: 9.3) – An operating system command injection vulnerability that could be exploited by a remote unauthenticated attacker to run arbitrary commands
  • CVE-2025-7850 (CVSS score: 9.3) – An operating system command injection vulnerability that could be exploited by an attacker in possession of an administrator password of the web portal to run arbitrary commands
  • CVE-2025-7851 (CVSS score: 8.7) – An improper privilege management vulnerability that could be exploited by an attacker to obtain the root shell on the underlying operating system under restricted conditions

CIS Build Kits

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“Attackers may execute arbitrary commands on the device’s underlying operating system,” TP-Link said in an advisory released Tuesday.

The issues impact the following product models and versions –

  • ER8411 < 1.3.3 Build 20251013 Rel.44647
  • ER7412-M2 < 1.1.0 Build 20251015 Rel.63594
  • ER707-M2 < 1.3.1 Build 20251009 Rel.67687
  • ER7206 < 2.2.2 Build 20250724 Rel.11109
  • ER605 < 2.3.1 Build 20251015 Rel.78291
  • ER706W < 1.2.1 Build 20250821 Rel.80909
  • ER706W-4G < 1.2.1 Build 20250821 Rel.82492
  • ER7212PC < 2.1.3 Build 20251016 Rel.82571
  • G36 < 1.1.4 Build 20251015 Rel.84206
  • G611 < 1.2.2 Build 20251017 Rel.45512
  • FR365 < 1.1.10 Build 20250626 Rel.81746
  • FR205 < 1.0.3 Build 20251016 Rel.61376
  • FR307-M2 < 1.2.5 Build 20251015 Rel.76743

While TP-Link makes no mention of the flaws being exploited in the wild, it’s advised that users move quickly to download and update to the latest firmware to fix the vulnerabilities.

“Check the configurations of the device after the firmware upgrade to ensure that all settings remain accurate, secure, and aligned with their intended preferences,” it added.

It also noted in a disclaimer that it cannot bear any responsibility for any consequences that may arise if the aforementioned recommended actions are not adhered to.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «meta rolls out new tools to protect whatsapp and messenger Meta Rolls Out New Tools to Protect WhatsApp and Messenger Users from Scams
Next Post: TARmageddon Flaw in Async-Tar Rust Library Could Enable Remote Code Execution tarmageddon flaw in async tar rust library could enable remote code»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.