CVE-2025-32107

8.0 HIGH

📋 TL;DR

This CVE describes an OS command injection vulnerability in Deco BE65 Pro mesh Wi-Fi systems that allows authenticated users to execute arbitrary commands on the device. Attackers who can log into the device can potentially gain full control over the system. This affects Deco BE65 Pro devices running firmware versions prior to 1.1.2 Build 20250123.

💻 Affected Systems

Products:
  • TP-Link Deco BE65 Pro
Versions: All firmware versions prior to Deco BE65 Pro(JP)_V1_1.1.2 Build 20250123
Operating Systems: Embedded Linux (router firmware)
Default Config Vulnerable: ⚠️ Yes
Notes: Japanese market version specifically mentioned, but other regional variants likely affected. Requires authenticated access to exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attackers to install persistent malware, pivot to internal networks, intercept all network traffic, or brick the device.

🟠

Likely Case

Local network compromise where attackers gain control of the router to intercept traffic, modify DNS settings, or launch attacks against other devices on the network.

🟢

If Mitigated

Limited impact if strong authentication is enforced and network segmentation isolates the device from critical systems.

🌐 Internet-Facing: MEDIUM - While the exploit requires authentication, many home/small business routers have weak default credentials or are exposed to the internet for remote management.
🏢 Internal Only: HIGH - Once an attacker gains access to the local network (via phishing, malware, or physical access), they can exploit this vulnerability to take control of the network infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - OS command injection is straightforward to exploit once authentication is bypassed or obtained.

Exploitation requires valid user credentials. Attackers may obtain these through default credentials, credential stuffing, or social engineering.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Deco BE65 Pro(JP)_V1_1.1.2 Build 20250123

Vendor Advisory: https://www.tp-link.com/jp/support/download/deco-be65-pro/#Firmware

Restart Required: Yes

Instructions:

1. Log into Deco web interface. 2. Navigate to Advanced > System > Firmware Upgrade. 3. Click 'Check for Updates' or manually upload firmware version 1.1.2 Build 20250123. 4. Wait for upgrade to complete and device to reboot.

🔧 Temporary Workarounds

Disable remote management

all

Prevent external access to the router's management interface

Enforce strong authentication

all

Change default credentials and implement strong password policies

🧯 If You Can't Patch

  • Isolate Deco BE65 Pro on separate VLAN away from critical systems
  • Implement network monitoring for unusual command execution patterns

🔍 How to Verify

Check if Vulnerable:

Log into Deco web interface, navigate to Advanced > System > Firmware Upgrade, check current firmware version.

Check Version:

No CLI command available - check via web interface at Advanced > System > Firmware Upgrade

Verify Fix Applied:

Confirm firmware version shows 'Deco BE65 Pro(JP)_V1_1.1.2 Build 20250123' or later in the web interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed login attempts followed by successful login

Network Indicators:

  • Unusual outbound connections from router
  • DNS hijacking or unexpected proxy configurations

SIEM Query:

Search for: 'process execution' AND 'router' OR 'deco' AND 'unusual command' OR 'shell execution'

🔗 References

📤 Share & Export