Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Why organizations abandon static secrets for managed identities

Industry leaders call for low-carbon ammonia to be recognized in UK hydrogen strategy

Oxford University’s £11m project to revolutionize chronic pain management

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » TP-Link patches four flaws in Omada gateway, two of which could lead to remote code execution
Identity

TP-Link patches four flaws in Omada gateway, two of which could lead to remote code execution

userBy userOctober 22, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 22, 2025Ravi LakshmananVulnerability/Network Security

TP-Link patches four flaws in Omada gateway

TP-Link has released a security update that addresses four security flaws affecting Omada Gateway devices, including two critical bugs that could lead to the execution of arbitrary code.

The vulnerabilities in question are as follows.

CVE-2025-6541 (CVSS score: 8.6) – Operating system command injection vulnerability. It could be exploited by an attacker who could log into the web management interface and execute arbitrary commands. CVE-2025-6542 (CVSS score: 9.3) – Operating system command injection vulnerability. It may be exploited by a remote unauthenticated attacker to execute arbitrary commands. CVE-2025-7850 (CVSS score: 9.3) – Operating system command injection vulnerability. It could be used by an attacker in possession of the web portal’s administrator password to execute arbitrary commands. CVE-2025-7851 (CVSS score: 8.7) – Improper privilege management vulnerability. It could be exploited by an attacker to obtain the underlying root shell. Operating system under restricted conditions

DFIR retainer service

“An attacker could execute arbitrary commands on the device’s underlying operating system,” TP-Link said in an advisory published Tuesday.

This issue affects the following product models and versions:

ER8411 < 1.3.3 Build 20251013 Rel.44647 ER7412-M2 < 1.1.0 Build 20251015 Rel.63594 ER707-M2 < 1.3.1 Build 20251009 Rel.67687 ER7206 < 2.2.2 Build 20250724 Rel.11109 ER605 < 2.3.1 Build 20251015 Rel.78291 ER706W < 1.2.1 Build 20250821 Rel.80909 ER706W-4G < 1.2.1 Build 20250821 Rel.82492 ER7212PC < 2.1.3 Build 20251016 Rel.82571 G36 < 1.1.4 Build 20251015 Release 84206 G611 < 1.2.2 Build 20251017 Rel.45512 FR365 < 1.1.10 Build 20250626 Rel.81746 FR205 < 1.0.3 Build 20251016 Rel.61376 FR307-M2 < 1.2.5 Build 20251015 Rel.76743

TP-Link does not mention which vulnerabilities are being exploited in the wild, but recommends that users promptly download and update the latest firmware to fix the vulnerabilities.

“Please check your device configuration after a firmware upgrade to ensure that all settings are accurate, secure, and match the intended settings,” it added.

The disclaimer also states that we are not responsible for any consequences that may arise if the aforementioned recommended actions are not followed.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleJames Webb telescope reveals chaotic surprises of the early universe
Next Article Async-Tar Rust library TARmageddon flaw could allow remote code execution
user
  • Website

Related Posts

Why organizations abandon static secrets for managed identities

October 23, 2025

‘Jingle Thief’ Hacker Abuses Cloud Infrastructure to Steal Millions of Dollars in Gift Cards

October 23, 2025

Over 250 Magento stores hit overnight as hackers exploit new flaw in Adobe Commerce

October 23, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Why organizations abandon static secrets for managed identities

Industry leaders call for low-carbon ammonia to be recognized in UK hydrogen strategy

Oxford University’s £11m project to revolutionize chronic pain management

‘Jingle Thief’ Hacker Abuses Cloud Infrastructure to Steal Millions of Dollars in Gift Cards

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Revolutionize Your Workflow: TwinH Automates Tasks Without Your Presence

FySelf’s TwinH Unlocks 6 Vertical Ecosystems: Your Smart Digital Double for Every Aspect of Life

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.