Home

Description

An arbitrary OS command may be executed on the product by the user who can log in to the web management interface.

PUBLISHED Reserved 2025-06-23 | Published 2025-10-21 | Updated 2025-10-21 | Assigner TPLink




HIGH: 8.6CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unknown

Any version before ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3
affected

Default status
unaffected

Any version before FR365 1.1.10, FR205 1.0.3, FR307 1.2.5
affected

Default status
unaffected

Any version before G36 1.1.4, G611 1.2.2
affected

References

support.omadanetworks.com/en/document/108455/ vendor-advisory

www.omadanetworks.com/...siness-networking/all-omada-router/ product

www.omadanetworks.com/...king/omada-pro-router-wired-router/ product

www.tp-link.com/us/business-networking/soho-festa-gateway/ product

cve.org (CVE-2025-6541)

nvd.nist.gov (CVE-2025-6541)

Download JSON