Filtered by vendor Tp-link Subscriptions
Filtered by product Omada Software Controller Subscriptions
Total 3 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2025-9290 1 Tp-link 114 Beam Bridge 5 Ur, Beam Bridge 5 Ur Firmware, Dr3220v-4g and 111 more 2026-03-16 5.9 Medium
An authentication weakness was identified in Omada Controllers, Gateways and Access Points, controller-device adoption due to improper handling of random values. Exploitation requires advanced network positioning and allows an attacker to intercept adoption traffic and forge valid authentication through offline precomputation, potentially exposing sensitive information and compromising confidentiality.
CVE-2025-9289 1 Tp-link 10 Oc200, Oc200 Firmware, Oc220 and 7 more 2026-03-16 4.7 Medium
A Cross-Site Scripting (XSS) vulnerability was identified in a parameter in Omada Controllers due to improper input sanitization. Exploitation requires advanced conditions, such as network positioning or emulating a trusted entity, and user interaction by an authenticated administrator. If successful, an attacker could execute arbitrary JavaScript in the administrator’s browser, potentially exposing sensitive information and compromising confidentiality.
CVE-2021-44032 1 Tp-link 1 Omada Software Controller 2024-11-21 7.5 High
TP-Link Omada SDN Software Controller before 5.0.15 does not check if the authentication method specified in a connection request is allowed. An attacker can bypass the captive portal authentication process by using the downgraded "no authentication" method, and access the protected network. For example, the attacker can simply set window.authType=0 in client-side JavaScript.