reCIPHER BIS® v13
  • Contact
  • Blog
  • Products
  • About Us
  • Help Articles
  • Login
Blog / CYBER-SECURITY

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution

TP-Link Patches Four Omada Gateway Flaws, Two Allow Remote Code Execution

October 22, 2025 · 2 min read

SOURCE:  https://thehackernews.com/2025/10/tp-link-patches-four-omada-gateway.html


TP-Link Patches Four Omada Gateway Flaws

TP-Link has released security updates to address four security flaws impacting Omada gateway devices, including two critical bugs that could result in arbitrary code execution.

The vulnerabilities in question are listed below -

  1. CVE-2025-6541 (CVSS score: 8.6) - An operating system command injection vulnerability that could be exploited by an attacker who can log in to the web management interface to run arbitrary commands
  2. CVE-2025-6542 (CVSS score: 9.3) - An operating system command injection vulnerability that could be exploited by a remote unauthenticated attacker to run arbitrary commands
  3. CVE-2025-7850 (CVSS score: 9.3) - An operating system command injection vulnerability that could be exploited by an attacker in possession of an administrator password of the web portal to run arbitrary commands
  4. CVE-2025-7851 (CVSS score: 8.7) - An improper privilege management vulnerability that could be exploited by an attacker to obtain the root shell on the underlying operating system under restricted conditions

"Attackers may execute arbitrary commands on the device's underlying operating system," TP-Link said in an advisory released Tuesday.

The issues impact the following product models and versions -

  1. ER8411 < 1.3.3 Build 20251013 Rel.44647
  2. ER7412-M2 < 1.1.0 Build 20251015 Rel.63594
  3. ER707-M2 < 1.3.1 Build 20251009 Rel.67687
  4. ER7206 < 2.2.2 Build 20250724 Rel.11109
  5. ER605 < 2.3.1 Build 20251015 Rel.78291
  6. ER706W < 1.2.1 Build 20250821 Rel.80909
  7. ER706W-4G < 1.2.1 Build 20250821 Rel.82492
  8. ER7212PC < 2.1.3 Build 20251016 Rel.82571
  9. G36 < 1.1.4 Build 20251015 Rel.84206
  10. G611 < 1.2.2 Build 20251017 Rel.45512
  11. FR365 < 1.1.10 Build 20250626 Rel.81746
  12. FR205 < 1.0.3 Build 20251016 Rel.61376
  13. FR307-M2 < 1.2.5 Build 20251015 Rel.76743

While TP-Link makes no mention of the flaws being exploited in the wild, it's advised that users move quickly to download and update to the latest firmware to fix the vulnerabilities.

"Check the configurations of the device after the firmware upgrade to ensure that all settings remain accurate, secure, and aligned with their intended preferences," it added.

It also noted in a disclaimer that it cannot bear any responsibility for any consequences that may arise if the aforementioned recommended actions are not adhered to.


Published on October 22, 2025

reCIPHER™ Admin

Hi, I am the reCIPHER™ BIS Admin! We are located in Collingwood, Melbourne, and service all areas within 100KM Radius of Melbourne CBD. Please visit our website at www.reCIPHERgroup.com to learn more about our services.

Footer Logo
© reCIPHER Group P/L 2024 ®

reCIPHER Group Pty. Ltd. and all subsidiaries are owned and operated by the Trustee for the reCIPHER Group P/L Trust, Australia.

Website: www.reCIPHER.com

Email:  Info@reCIPHER.com

Office:  101/73A Rupert Street Collingwood, Melbourne, 3066, Victoria, Australia

24-hour Helpdesk Australia Wide1300-420-964
Sales Enquiries61399001112
CCTV & Security Enquiries61399001113
Website Hosting & Domain Name Enquiries61399001114
reCIPHER Hardware Enquiries61399001115
Websitewww.reCIPHER.com
EmailInfo@reCIPHER.com
Office Address [strictly by appointment]101/73A Rupert Street Collingwood, Melbourne, 3066, Victoria, Australia
A.C.N.169 283 256
Powered by reCIPHER® BIS - ERP Software for Service Companies