Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Critical Vulnerabilities Patched in TP-Link’s Omada Gateways

One of the flaws can be exploited by remote unauthenticated attackers for arbitrary command execution.

TP-Link vulnerabilities

TP-Link is warning users that some of its Omada gateways are affected by several vulnerabilities, including critical flaws.

The networking giant has published two advisories this week to inform customers about four security holes in Omada gateway devices. More than a dozen ER, G and FR series product models are affected and TP-Link has released firmware patches for each of them. 

The most serious of the vulnerabilities appears to be CVE-2025-6542. It has a CVSS score of 9.3 and it can allow a remote, unauthenticated attacker to execute arbitrary OS commands on the targeted system.

While it has not been confirmed by the vendor, these types of vulnerabilities can typically allow an attacker to take full control of impacted devices.

Another flaw with a ‘critical severity’ rating is CVE-2025-7850, described as a command injection issue that can be exploited by an attacker who has admin access to the web portal of Omada gateways. 

The two remaining vulnerabilities have been rated ‘high severity’. CVE-2025-7851 allows an attacker to obtain root access to a device, while CVE-2025-6541 can be exploited for OS command execution by an authenticated attacker.

Advertisement. Scroll to continue reading.

The vendor has advised customers to not only update the firmware on their device, but also to change its password.

It’s not uncommon for threat actors to exploit TP-Link product vulnerabilities in their attacks. 

UPDATE: Forescout, whose researchers discovered CVE-2025-7850 and CVE-2025-7851, has published a blog post detailing these flaws.

Related: US Lawmakers Want Investigation Into TP-Link Over Chinese Hacking Fears

Related: Cisco Routers Hacked for Rootkit Deployment

Related: Unauthenticated RCE Flaw Patched in DrayTek Routers

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.