Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14737: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in TP-Link Systems Inc. WA850RE

0
High
VulnerabilityCVE-2025-14737cvecve-2025-14737cwe-78
Published: Thu Dec 18 2025 (12/18/2025, 18:00:29 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: WA850RE

Description

Command Injection vulnerability in TP-Link WA850RE (httpd modules) allows authenticated adjacent attacker to inject arbitrary commands.This issue affects: ≤ WA850RE V2_160527, ≤ WA850RE V3_160922.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:31:57 UTC

Technical Analysis

CVE-2025-14737 is an OS command injection vulnerability classified under CWE-78 affecting TP-Link Systems Inc.'s WA850RE Wi-Fi range extenders, specifically versions V2_160527 and V3_160922. The vulnerability resides in the httpd modules of the device firmware, which improperly neutralize special elements used in OS commands. An attacker with authenticated access on an adjacent network can exploit this flaw to inject arbitrary commands into the underlying operating system. This means the attacker can execute commands with the privileges of the httpd process, potentially leading to full device compromise. The attack vector requires the attacker to be adjacent (e.g., connected to the same local network segment) and authenticated with high privileges, but does not require user interaction. The vulnerability affects the confidentiality, integrity, and availability of the device and potentially the broader network environment. The CVSS 4.0 vector indicates low attack complexity, no user interaction, and high impact on all security properties. No patches or known exploits have been reported yet, but the vulnerability is publicly disclosed and should be treated as a significant risk. The lack of patch availability increases the urgency for mitigation through network segmentation, access control, and monitoring.

Potential Impact

The exploitation of this vulnerability can lead to complete compromise of the affected TP-Link WA850RE devices. An attacker could execute arbitrary OS commands, potentially gaining control over the device's firmware and configuration. This could allow interception or manipulation of network traffic, creation of persistent backdoors, or use of the device as a pivot point for further attacks within the network. The confidentiality of data passing through or stored on the device could be breached, integrity of network configurations could be altered, and availability could be disrupted by malicious commands. Organizations relying on these devices for network extension or Wi-Fi coverage may face significant operational disruptions and data breaches. The impact is especially critical in environments where these devices are deployed in sensitive or business-critical networks, such as corporate offices, educational institutions, or government facilities.

Mitigation Recommendations

1. Immediately restrict administrative access to the TP-Link WA850RE devices to trusted personnel only and enforce strong authentication mechanisms. 2. Segment the network to isolate these devices from critical infrastructure and sensitive data flows, limiting the attacker's ability to reach the device. 3. Monitor network traffic and device logs for unusual command execution patterns or unauthorized access attempts. 4. Disable remote management interfaces if not required, especially from untrusted networks. 5. Regularly audit device firmware versions and configurations to identify affected units. 6. Contact TP-Link support or check official channels frequently for firmware updates or patches addressing this vulnerability. 7. If possible, replace affected devices with models not impacted by this vulnerability or from vendors with timely security updates. 8. Employ intrusion detection/prevention systems to detect exploitation attempts targeting this vulnerability. 9. Educate network administrators about the risk and signs of exploitation to ensure rapid response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-12-15T18:35:26.252Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694443d04eb3efac369ef733

Added to database: 12/18/2025, 6:11:28 PM

Last enriched: 2/27/2026, 6:31:57 AM

Last updated: 3/26/2026, 11:12:06 AM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses