CVE-2025-7850
Severity CVSS v4.0:
CRITICAL
Type:
CWE-78
OS Command Injections
Publication date:
21/10/2025
Last modified:
24/10/2025
Description
A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
7.20
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:tp-link:er8411_firmware:*:*:*:*:*:*:*:* | 1.3.3 (excluding) | |
| cpe:2.3:o:tp-link:er8411_firmware:1.3.3:-:*:*:*:*:*:* | ||
| cpe:2.3:h:tp-link:er8411:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:tp-link:er7412-m2_firmware:*:*:*:*:*:*:*:* | 1.1.0 (excluding) | |
| cpe:2.3:o:tp-link:er7412-m2_firmware:1.1.0:-:*:*:*:*:*:* | ||
| cpe:2.3:h:tp-link:er7412-m2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:tp-link:er707-m2_firmware:*:*:*:*:*:*:*:* | 1.3.1 (excluding) | |
| cpe:2.3:o:tp-link:er707-m2_firmware:1.3.1:-:*:*:*:*:*:* | ||
| cpe:2.3:h:tp-link:er707-m2:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:tp-link:er7206_firmware:*:*:*:*:*:*:*:* | 2.2.2 (excluding) | |
| cpe:2.3:o:tp-link:er7206_firmware:2.2.2:-:*:*:*:*:*:* | ||
| cpe:2.3:h:tp-link:er7206:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:tp-link:er605_firmware:*:*:*:*:*:*:*:* | 2.3.1 (excluding) | |
| cpe:2.3:o:tp-link:er605_firmware:2.3.1:-:*:*:*:*:*:* | ||
| cpe:2.3:h:tp-link:er605:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://support.omadanetworks.com/en/document/108456/
- https://www.forescout.com/blog/new-tp-link-router-vulnerabilities-a-primer-on-rooting-routers/
- https://www.omadanetworks.com/us/business-networking/all-omada-router/
- https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/
- https://www.tp-link.com/us/business-networking/soho-festa-gateway/



