Threat Insight
TP-Link Router Command Injection and Root Access Vulnerabilities
Two new vulnerabilities[1] could allow for a threat actor to gain root privileges and execute arbitrary commands on TP-Link Omada gateway devices.
CVE-2025-7850: This is a command injection vulnerability that can be exploited after an administrator logs into the web portal of TP-Link Omada gateways. It allows attackers to inject and execute arbitrary operating system commands via the web interface.
CVE-2025-7851: This flaw enables attackers to gain root shell access to the underlying system of Omada gateways. Which can be chained with CVE-2025-7850 or other vulnerabilities to deepen the compromise.
For successful exploitation of CVE-2025-7850 to be possible, it requires authenticated access to the web portal with admin privileges. However, no other user interaction is needed beyond the login.
CVE
CVE-2025-7850
CVE-2025-7851
Affected Products
ER8411 < 1.3.3 Build 20251013 Rel.44647
ER7412-M2 < 1.1.0 Build 20251015 Rel.63594
ER707-M2 < 1.3.1 Build 20251009 Rel.67687
ER7206 < 2.2.2 Build 20250724 Rel.11109
ER605 < 2.3.1 Build 20251015 Rel.78291
ER706W < 1.2.1 Build 20250821 Rel.80909
ER706W-4G < 1.2.1 Build 20250821 Rel.82492
ER7212PC < 2.1.3 Build 20251016 Rel.82571
G36 < 1.1.4 Build 20251015 Rel.84206
G611 < 1.2.2 Build 20251017 Rel.45512
FR365 < 1.1.10 Build 20250626 Rel.81746
FR205 < 1.0.3 Build 20251016 Rel.61376
FR307-M2 < 1.2.5 Build 20251015 Rel.76743
Exploitation
Exploitation has been detected in the wild, and a proof-of-concept (PoC) exploit seems to have previously been publicly available[2].
Recommended Actions
Truesec recommends applying the latest TP-Link firmware patches as soon as available.
Deploy web application firewalls in front of management interfaces to filter malicious traffic and prevent command injection and other web-based exploits.
Where possible, disable remote administration to reduce exposure. For essential access, enforce VPN usage and implement stringent access controls to safeguard management interfaces.
References
[1] https://support.omadanetworks.com/us/document/108456/
[2] https://github.com/ByteHawkSec/CVE-2025-7850-POC
Stay ahead with cyber insights
Newsletter
Stay ahead in cybersecurity! Sign up for Truesec’s newsletter to receive the latest insights, expert tips, and industry news directly to your inbox. Join our community of professionals and stay informed about emerging threats, best practices, and exclusive updates from Truesec.