TP-Link urges immediate updates for Omada Gateways after critical flaws discovery
好的,我现在需要帮用户总结这篇文章的内容。用户的要求是用中文,控制在一百个字以内,不需要特定的开头,直接写描述。 首先,我快速浏览文章内容。文章主要讲TP-Link发现了Omada网关设备中的四个关键漏洞,影响ER、G和FR系列的多个型号。这些漏洞包括任意操作系统命令执行和命令注入等,CVSS评分都很高,最高9.3分。 接下来,TP-Link已经发布了固件更新来修复这些问题,并敦促用户立即安装更新。此外,他们还建议用户更改默认密码并限制管理界面的访问。 现在我需要将这些信息浓缩到100字以内。要涵盖主要点:发现漏洞、影响范围、漏洞严重性、修复措施。 可能的结构:TP-Link发现四个关键漏洞影响多个Omada网关型号,最高CVSS 9.3分。建议用户立即更新固件,并采取额外安全措施。 检查字数是否符合要求。确保语言简洁明了,不遗漏关键信息。 </think> TP-Link发现Omada网关设备存在四个关键漏洞(包括CVE-2025-6542和CVE-2025-7850),影响ER、G和FR系列的多个型号。这些漏洞可能导致任意操作系统命令执行或命令注入攻击。建议用户立即更新固件至最新版本,并采取更改默认密码和限制管理界面访问等安全措施以防范风险。 2025-10-22 17:56:48 Author: securityaffairs.com(查看原文) 阅读量:10 收藏

TP-Link urges immediate updates for Omada Gateways after critical flaws discovery

TP-Link warns of critical flaws in Omada gateways across ER, G, and FR models. Users should update firmware immediately to stay secure.

TP-Link is warning users of critical flaws impacting its Omada gateway devices. The Taiwanese company published two security advisories this week, outlining four vulnerabilities that impacts more than a dozen products across the ER, G, and FR series. The vendor has already released firmware updates to address the issues and urges users to install it immediately.

The most severe vulnerability, tracked as CVE-2025-6542 (CVSS score of 9.3) is an arbitrary OS command impacting Omada gateways.

“An arbitrary OS command may be executed on Omada gateways by the user who can log in to the web management interface or by a remote unauthenticated attacker.” reads the advisory. “Attackers may execute arbitrary commands on the device’s underlying operating system.”

The flaw affects the following products and versions:

Affected Product ModelAffected VersionFixed Version
ER8411< 1.3.3 Build 20251013 Rel.44647>= 1.3.3 Build 20251013 Rel.44647
ER7412-M2< 1.1.0 Build 20251015 Rel.63594>= 1.1.0 Build 20251015 Rel.63594
ER707-M2< 1.3.1 Build 20251009 Rel.67687>= 1.3.1 Build 20251009 Rel.67687
ER7206< 2.2.2 Build 20250724 Rel.11109>= 2.2.2 Build 20250724 Rel.11109
ER605< 2.3.1 Build 20251015 Rel.78291>= 2.3.1 Build 20251015 Rel.78291
ER706W< 1.2.1 Build 20250821 Rel.80909>= 1.2.1 Build 20250821 Rel.80909
ER706W-4G< 1.2.1 Build 20250821 Rel.82492>= 1.2.1 Build 20250821 Rel.82492
ER7212PC< 2.1.3 Build 20251016 Rel.82571>= 2.1.3 Build 20251016 Rel.82571
G36< 1.1.4 Build 20251015 Rel.84206>= 1.1.4 Build 20251015 Rel.84206
G611< 1.2.2 Build 20251017 Rel.45512>= 1.2.2 Build 20251017 Rel.45512
FR365< 1.1.10 Build 20250626 Rel.81746>= 1.1.10 Build 20250626 Rel.81746
FR205< 1.0.3 Build 20251016 Rel.61376>= 1.0.3 Build 20251016 Rel.61376
FR307-M2< 1.2.5 Build 20251015 Rel.76743>= 1.2.5 Build 20251015 Rel.76743

The vendor addressed a second command critical vulnerability, tracked as CVE-2025-7850 (CVSS score of 9.3). The vulnerability is a command injection issue, an attacker could exploit the flaw after the admin’s authentication on the web portal on Omada gateways.

“A command injection vulnerability may be exploited after the admin’s authentication on the web portal on Omada gateways.” reads the advisory.

The flaw affects the following products:

Affected Product ModelAffected VersionFixed Version
ER8411< 1.3.3 Build 20251013 Rel.44647>= 1.3.3 Build 20251013 Rel.44647
ER7412-M2< 1.1.0 Build 20251015 Rel.63594>= 1.1.0 Build 20251015 Rel.63594
ER707-M2< 1.3.1 Build 20251009 Rel.67687>= 1.3.1 Build 20251009 Rel.67687
ER7206< 2.2.2 Build 20250724 Rel.11109>= 2.2.2 Build 20250724 Rel.11109
ER605< 2.3.1 Build 20251015 Rel.78291>= 2.3.1 Build 20251015 Rel.78291
ER706W< 1.2.1 Build 20250821 Rel.80909>= 1.2.1 Build 20250821 Rel.80909
ER706W-4G< 1.2.1 Build 20250821 Rel.82492>= 1.2.1 Build 20250821 Rel.82492
ER7212PC< 2.1.3 Build 20251016 Rel.82571>= 2.1.3 Build 20251016 Rel.82571
G36< 1.1.4 Build 20251015 Rel.84206>= 1.1.4 Build 20251015 Rel.84206
G611< 1.2.2 Build 20251017 Rel.45512>= 1.2.2 Build 20251017 Rel.45512
FR365< 1.1.10 Build 20250626 Rel.81746>= 1.1.10 Build 20250626 Rel.81746
FR205< 1.0.3 Build 20251016 Rel.61376>= 1.0.3 Build 20251016 Rel.61376
FR307-M2< 1.2.5 Build 20251015 Rel.76743>= 1.2.5 Build 20251015 Rel.76743

The two additional vulnerabilities fixed by the vendor are:

  • CVE-2025-7851 (CVSS score of 8.7) – root access vulnerabilities on Omada. An attacker may obtain the root shell on the underlying with the restricted conditions on Omada gateways.
  • CVE-2025-6541 (CVSS score of 8.6) – An arbitrary OS command may be executed on Omada gateways by the user who can log in to the web management interface or by a remote unauthenticated attacker.

TP-Link is urging all users to take immediate action:

  • Install the latest firmware updates available on TP-Link’s support site.
  • Change default or weak passwords on all affected Omada gateways.
  • Restrict access to the device’s management interface, ideally limiting it to trusted internal networks.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, TP-Link)




文章来源: https://securityaffairs.com/183690/security/tp-link-urges-immediate-updates-for-omada-gateways-after-critical-flaws-discovery.html
如有侵权请联系:admin#unsafe.sh