HomeVulnerabilityTP-Hyperlink warns of important command injection flaw in Omada gateways

TP-Hyperlink warns of important command injection flaw in Omada gateways

TP-Hyperlink is warning of two command injection vulnerabilities in Omada gateway gadgets that could possibly be exploited to execute arbitrary OS instructions.

Omada gateways are marketed as full-stack options (router, firewall, VPN gateway) for small to medium companies, and are continually rising in reputation.

Though the 2 security points result in the identical outcome when triggered, solely one in all them, recognized as CVE-2025-6542 with a important severity score of 9.3, will be exploited by a distant attacker with out authentication.

The second flaw is tracked as CVE-2025-6541 and obtained a decrease severity rating of 8.6. Nonetheless, it may be exploited provided that the attacker can log into the net administration interface.

“An arbitrary OS command could also be executed on Omada gateways by the consumer who can log in to the net administration interface or by a distant unauthenticated attacker,” reads TP-Hyperlink’s advisory.

“Attackers might execute arbitrary instructions on the machine’s underlying working system,” the corporate provides.

See also  US authorities blames 2023 Change breach on ‘preventable’ security failures by Microsoft

The chance the 2 vulnerabilities poses is important as it will probably result in a full compromise, information theft, lateral motion, and persistence.

CVE-2025-6541 and CVE-2025-6542 influence 13 Omada gateway fashions within the firmware variations listed beneath:

Affected Product Mannequin

Affected Model

Fastened Model

ER8411

< 1.3.3 Construct 20251013 Rel.44647

>= 1.3.3 Construct 20251013 Rel.44647

ER7412-M2

< 1.1.0 Construct 20251015 Rel.63594

>= 1.1.0 Construct 20251015 Rel.63594

ER707-M2

< 1.3.1 Construct 20251009 Rel.67687

>= 1.3.1 Construct 20251009 Rel.67687

ER7206

< 2.2.2 Construct 20250724 Rel.11109

>= 2.2.2 Construct 20250724 Rel.11109

ER605

< 2.3.1 Construct 20251015 Rel.78291

>= 2.3.1 Construct 20251015 Rel.78291

ER706W

< 1.2.1 Construct 20250821 Rel.80909

>= 1.2.1 Construct 20250821 Rel.80909

ER706W-4G

< 1.2.1 Construct 20250821 Rel.82492

>= 1.2.1 Construct 20250821 Rel.82492

ER7212PC

< 2.1.3 Construct 20251016 Rel.82571

>= 2.1.3 Construct 20251016 Rel.82571

G36

< 1.1.4 Construct 20251015 Rel.84206

>= 1.1.4 Construct 20251015 Rel.84206

G611

< 1.2.2 Construct 20251017 Rel.45512

>= 1.2.2 Construct 20251017 Rel.45512

FR365

< 1.1.10 Construct 20250626 Rel.81746

>= 1.1.10 Construct 20250626 Rel.81746

FR205

< 1.0.3 Construct 20251016 Rel.61376

>= 1.0.3 Construct 20251016 Rel.61376

FR307-M2

< 1.2.5 Construct 20251015 Rel.76743

>= 1.2.5 Construct 20251015 Rel.76743

See also  SinoTrack GPS Units Weak to Distant Car Management by way of Default Passwords

The seller has launched firmware updates that deal with the 2 issues and strongly recommends that customers with impacted gadgets to use the fixes and test the configurations after the improve to make it possible for all settings stay as supposed.

In a separate bulletin, TP-Hyperlink warned of two different extreme flaws that might enable authenticated command injection and root entry beneath sure situations.

The primary is CVE-2025-8750 (CVSS: 9.3), a command injection flaw that may be exploited by attackers holding admin passwords to entry the Omada net portal.

The opposite one is CVE-2025-7851 (CVSS: 8.7), which might allow an attacker to acquire shell entry with root privileges on the underlying OS, restricted to Omada’s privileges.

CVE-2025-7850 and CVE-2025-7851 influence the entire Omada gateway fashions listed within the desk above. It’s value noting that the most recent firmware launch addresses all 4 vulnerabilities.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular