CVE-2025-7851
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-10-21

Last updated on: 2025-10-24

Assigner: TPLink

Description
An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-10-21
Last Modified
2025-10-24
Generated
2026-05-07
AI Q&A
2025-10-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 39 associated CPEs
Vendor Product Version / Range
tp-link fr307-m2_firmware to 1.2.5 (exc)
tp-link fr307-m2_firmware 1.2.5
tp-link fr307-m2 *
tp-link fr205_firmware to 1.0.3 (exc)
tp-link fr205_firmware 1.0.3
tp-link fr205 *
tp-link fr365_firmware to 1.1.10 (exc)
tp-link fr365_firmware 1.1.10
tp-link fr365 *
tp-link g611_firmware to 1.2.2 (exc)
tp-link g611_firmware 1.2.2
tp-link g611 *
tp-link g36_firmware to 1.1.4 (exc)
tp-link g36_firmware 1.1.4
tp-link g36 *
tp-link er7212pc_firmware to 2.1.3 (exc)
tp-link er7212pc_firmware 2.1.3
tp-link er7212pc *
tp-link er706w-4g_firmware to 1.2.1 (exc)
tp-link er706w-4g_firmware 1.2.1
tp-link er706w-4g *
tp-link er706w_firmware to 1.2.1 (exc)
tp-link er706w_firmware 1.2.1
tp-link er706w *
tp-link er605_firmware to 2.3.1 (exc)
tp-link er605_firmware 2.3.1
tp-link er605 *
tp-link er7206_firmware to 2.2.2 (exc)
tp-link er7206_firmware 2.2.2
tp-link er7206 *
tp-link er707-m2_firmware to 1.3.1 (exc)
tp-link er707-m2_firmware 1.3.1
tp-link er707-m2 *
tp-link er7412-m2_firmware to 1.1.0 (exc)
tp-link er7412-m2_firmware 1.1.0
tp-link er7412-m2 *
tp-link er8411_firmware to 1.3.3 (exc)
tp-link er8411_firmware 1.3.3
tp-link er8411 *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability allows an attacker to obtain root shell access on the underlying operating system of Omada gateways under certain restricted conditions.


How can this vulnerability impact me? :

If exploited, this vulnerability can give an attacker full root access to the system, potentially allowing them to control the device, access sensitive data, disrupt network operations, or use the device as a foothold for further attacks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart