Vulnerability Description
A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tp-Link | Er8411 Firmware | < 1.3.3 |
| Tp-Link | Er8411 | - |
| Tp-Link | Er7412-M2 Firmware | < 1.1.0 |
| Tp-Link | Er7412-M2 | - |
| Tp-Link | Er707-M2 Firmware | < 1.3.1 |
| Tp-Link | Er707-M2 | - |
| Tp-Link | Er7206 Firmware | < 2.2.2 |
| Tp-Link | Er7206 | - |
| Tp-Link | Er605 Firmware | < 2.3.1 |
| Tp-Link | Er605 | - |
| Tp-Link | Er706W Firmware | < 1.2.1 |
| Tp-Link | Er706W | - |
| Tp-Link | Er706W-4G Firmware | < 1.2.1 |
| Tp-Link | Er706W-4G | - |
| Tp-Link | Er7212Pc Firmware | < 2.1.3 |
| Tp-Link | Er7212Pc | - |
| Tp-Link | G36 Firmware | < 1.1.4 |
| Tp-Link | G36 | - |
| Tp-Link | G611 Firmware | < 1.2.2 |
| Tp-Link | G611 | - |
Related Weaknesses (CWE)
References
- https://support.omadanetworks.com/en/document/108456/Vendor Advisory
- https://www.forescout.com/blog/new-tp-link-router-vulnerabilities-a-primer-on-ro
- https://www.omadanetworks.com/us/business-networking/all-omada-router/Product
- https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-routProduct
- https://www.tp-link.com/us/business-networking/soho-festa-gateway/Product
FAQ
What is CVE-2025-7850?
CVE-2025-7850 is a vulnerability with a CVSS score of 7.2 (HIGH). A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
How severe is CVE-2025-7850?
CVE-2025-7850 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-7850?
Check the references section above for vendor advisories and patch information. Affected products include: Tp-Link Er8411 Firmware, Tp-Link Er8411, Tp-Link Er7412-M2 Firmware, Tp-Link Er7412-M2, Tp-Link Er707-M2 Firmware.