{"id":3357,"date":"2025-10-24T09:00:44","date_gmt":"2025-10-24T09:00:44","guid":{"rendered":"https:\/\/ft365.org\/index.php\/2025\/10\/24\/major-vulnerabilities-found-in-tp-link-vpn-routers\/"},"modified":"2025-10-24T09:00:44","modified_gmt":"2025-10-24T09:00:44","slug":"major-vulnerabilities-found-in-tp-link-vpn-routers","status":"publish","type":"post","link":"https:\/\/ft365.org\/index.php\/2025\/10\/24\/major-vulnerabilities-found-in-tp-link-vpn-routers\/","title":{"rendered":"Major Vulnerabilities Found in TP-Link VPN Routers"},"content":{"rendered":"<div id=\"cphContent_pnlArticleBody\" data-layout-id=\"2\" data-edit-folder-name=\"text\" data-index=\"0\">\n<p>Researchers at Forescout\u2019s Vedere Labs have discovered two new vulnerabilities in TP-Link\u2019s Omada and Festa VPN routers that could allow threat actors to perform command injection and unauthorized root access.<\/p>\n<p>These flaws, tracked as CVE-2025-7850 and CVE-2025-7851, are respectively considered critical (CVSS 4.0 of 9.3) and high-severity (CVSS 4.0 of 8.7).<\/p>\n<p>According to a Vedere Labs report published on October 23, these vulnerabilities come from what the researchers described as an incomplete fix of CVE-2024-21827 by TP-Link in 2024\u00a0which left debug functionality accessible, meaning that partial remediation created alternate attack paths.<\/p>\n<p>After rooting a TP-Link Omada ER605v2 router, they discovered that the patch addressed CVE-2024-21827, but left two serious caveats:<\/p>\n<ol>\n<li>The same private key used across multiple devices was required for both root access and firmware signing<\/li>\n<li>The old \u201cdebug code\u201d remained, which meant that if an attacker could create the \u201c<em>image_type_debug<\/em>\u201d file via another vulnerability or hidden feature, the original root login path could still be exploitable<\/li>\n<\/ol>\n<p>This issue was reported to TP-Link, which assigned it CVE-2025-7851, as a flaw that allows unauthorized root access to some Omada and Festa VPN routers through residual debug code.<\/p>\n<p>\u201cHowever, CVE-2025-7851 alone was insufficient for us to root the ER605v2 directly: we didn\u2019t have the private key and the \u201c<em>image_type_debug<\/em>\u201d file was not present in the public firmware,\u201d the Vedere Labs researchers wrote.<\/p>\n<p>They analyzed the use of LuCI, a Lua-based framework for configuring devices via the web UI or other interfaces, by many TP-Link products with \u201ca history of vulnerabilities.\u201d<\/p>\n<p>The researchers quickly found that the WireGuard VPN settings in the Web UI of the ER605v2 router exposed a private-key field that was not properly sanitized, allowing an authenticated user to inject arbitrary OS commands that the device executes with root privileges. This\u00a0vulnerability was also reported to TP-Link, which assigned it CVE-2025-7850.<\/p>\n<p>Additionally, the researchers\u2019 analysis revealed that CVE-2025-7850 can be exploited without credentials in certain deployments, with potential exploit scenarios beyond initial local exploitation.<\/p>\n<p>The patches for these two vulnerabilities have now been released by TP-Link.<\/p>\n<p>Vedere Labs recommended users to apply TP-Link\u2019s firmware patches immediately and to add further security controls, including the following:<\/p>\n<ul>\n<li>Deploying web application firewalls before management interfaces and blocking command injection and web-based attacks<\/li>\n<li>Disabling remote administration where feasible<\/li>\n<li>Logging all admin sessions and router traffic and looking out for anomalies and exploitation indicators<\/li>\n<li>Reviewing vendor support mechanisms on TP-Link devices<\/li>\n<\/ul>\n<p><em>Read now: US Bipartisan Committee Urges Investigation Into Chinese Wi-Fi Routers<\/em><\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Researchers at Forescout\u2019s Vedere Labs have discovered two new vulnerabilities in TP-Link\u2019s Omada and Festa VPN routers that could allow threat actors to perform command injection and unauthorized root access. These flaws, tracked as CVE-2025-7850 and CVE-2025-7851, are respectively considered critical (CVSS 4.0 of 9.3) and high-severity (CVSS 4.0 of 8.7). According to a Vedere<\/p>\n","protected":false},"author":2,"featured_media":3358,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-3357","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"featured_image_urls":{"full":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3357-b531dc84-ef2c-496e-887c-f7c973740007.jpg",300,300,false],"thumbnail":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3357-b531dc84-ef2c-496e-887c-f7c973740007-150x150.jpg",150,150,true],"medium":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3357-b531dc84-ef2c-496e-887c-f7c973740007.jpg",300,300,false],"medium_large":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3357-b531dc84-ef2c-496e-887c-f7c973740007.jpg",300,300,false],"large":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3357-b531dc84-ef2c-496e-887c-f7c973740007.jpg",300,300,false],"1536x1536":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3357-b531dc84-ef2c-496e-887c-f7c973740007.jpg",300,300,false],"2048x2048":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3357-b531dc84-ef2c-496e-887c-f7c973740007.jpg",300,300,false],"morenews-featured":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3357-b531dc84-ef2c-496e-887c-f7c973740007.jpg",300,300,false],"morenews-large":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3357-b531dc84-ef2c-496e-887c-f7c973740007.jpg",300,300,false],"morenews-medium":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3357-b531dc84-ef2c-496e-887c-f7c973740007.jpg",300,300,false],"crawlomatic_preview_image":["https:\/\/ft365.org\/wp-content\/uploads\/2025\/10\/3357-b531dc84-ef2c-496e-887c-f7c973740007-146x146.jpg",146,146,true]},"author_info":{"display_name":"henry","author_link":"https:\/\/ft365.org\/index.php\/author\/henry\/"},"category_info":"<a href=\"https:\/\/ft365.org\/index.php\/category\/uncategorized\/\" rel=\"category tag\">Uncategorized<\/a>","tag_info":"Uncategorized","comment_count":"0","_links":{"self":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/3357","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/comments?post=3357"}],"version-history":[{"count":0,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/posts\/3357\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media\/3358"}],"wp:attachment":[{"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/media?parent=3357"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/categories?post=3357"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ft365.org\/index.php\/wp-json\/wp\/v2\/tags?post=3357"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}