-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
CVE Vulnerability Details :
CVE-2025-6542
PUBLISHED
More Info
Official Page
Assigner
-
TPLink
Assigner Org ID
-
f23511db-6c3e-4e32-a477-6aa17d310630
View Known Exploited Vulnerability (KEV) details
Published At
-
21 Oct, 2025 | 00:23
Updated At
-
21 Oct, 2025 | 14:15
Rejected At
-
▼
CVE Numbering Authority (CNA)
OS command injection in multiple parameters
An arbitrary OS command may be executed on the product by a remote unauthenticated attacker.
Affected Products
Vendor
TP-Link Systems Inc.
Product
Omada gateways
Default Status
unknown
Versions
Affected
From
0
before
ER8411 1.3.3, ER7412-M2 1.1.0, ER707-M2 1.3.1, ER7206 2.2.2, ER605 2.3.1, ER706W 1.2.1, ER706W-4G 1.2.1, ER7212PC 2.1.3
(Firmware)
Vendor
TP-Link Systems Inc.
Product
Festa gateways
Default Status
unaffected
Versions
Affected
From
0
before
FR365 1.1.10, FR205 1.0.3, FR307 1.2.5
(Firmware)
Vendor
TP-Link Systems Inc.
Product
Omada Pro gateways
Default Status
unaffected
Versions
Affected
From
0
before
G36 1.1.4, G611 1.2.2
(Firmware)
Problem Types
Type
CWE ID
Description
CWE
CWE-78
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Type:
CWE
CWE ID:
CWE-78
Description:
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Metrics
Version
Base score
Base severity
Vector
4.0
9.3
CRITICAL
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version:
4.0
Base score:
9.3
Base severity:
CRITICAL
Vector:
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC ID
Description
CAPEC-88
CAPEC-88 OS Command Injection
CAPEC ID:
CAPEC-88
Description:
CAPEC-88 OS Command Injection
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://support.omadanetworks.com/en/document/108455/
vendor-advisory
https://www.omadanetworks.com/us/business-networking/all-omada-router/
product
https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/
product
https://www.tp-link.com/us/business-networking/soho-festa-gateway/
product
Hyperlink:
https://support.omadanetworks.com/en/document/108455/
Resource:
vendor-advisory
Hyperlink:
https://www.omadanetworks.com/us/business-networking/all-omada-router/
Resource:
product
Hyperlink:
https://www.omadanetworks.com/us/business-networking/omada-pro-router-wired-router/
Resource:
product
Hyperlink:
https://www.tp-link.com/us/business-networking/soho-festa-gateway/
Resource:
product
▼
Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
Details not found