CVE-2025-32107
📋 TL;DR
This CVE describes an OS command injection vulnerability in Deco BE65 Pro mesh Wi-Fi systems that allows authenticated users to execute arbitrary commands on the device. Attackers who can log into the device can potentially gain full control over the system. This affects Deco BE65 Pro devices running firmware versions prior to 1.1.2 Build 20250123.
💻 Affected Systems
- TP-Link Deco BE65 Pro
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to install persistent malware, pivot to internal networks, intercept all network traffic, or brick the device.
Likely Case
Local network compromise where attackers gain control of the router to intercept traffic, modify DNS settings, or launch attacks against other devices on the network.
If Mitigated
Limited impact if strong authentication is enforced and network segmentation isolates the device from critical systems.
🎯 Exploit Status
Exploitation requires valid user credentials. Attackers may obtain these through default credentials, credential stuffing, or social engineering.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Deco BE65 Pro(JP)_V1_1.1.2 Build 20250123
Vendor Advisory: https://www.tp-link.com/jp/support/download/deco-be65-pro/#Firmware
Restart Required: Yes
Instructions:
1. Log into Deco web interface. 2. Navigate to Advanced > System > Firmware Upgrade. 3. Click 'Check for Updates' or manually upload firmware version 1.1.2 Build 20250123. 4. Wait for upgrade to complete and device to reboot.
🔧 Temporary Workarounds
Disable remote management
allPrevent external access to the router's management interface
Enforce strong authentication
allChange default credentials and implement strong password policies
🧯 If You Can't Patch
- Isolate Deco BE65 Pro on separate VLAN away from critical systems
- Implement network monitoring for unusual command execution patterns
🔍 How to Verify
Check if Vulnerable:
Log into Deco web interface, navigate to Advanced > System > Firmware Upgrade, check current firmware version.
Check Version:
No CLI command available - check via web interface at Advanced > System > Firmware Upgrade
Verify Fix Applied:
Confirm firmware version shows 'Deco BE65 Pro(JP)_V1_1.1.2 Build 20250123' or later in the web interface.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Multiple failed login attempts followed by successful login
Network Indicators:
- Unusual outbound connections from router
- DNS hijacking or unexpected proxy configurations
SIEM Query:
Search for: 'process execution' AND 'router' OR 'deco' AND 'unusual command' OR 'shell execution'