A denial-of-service (DoS) vulnerability was identified in Omada EAP610 v3. An attacker with adjacent network access can send crafted requests to cause the device’s HTTP service to crash. This results in temporary service unavailability until the device is rebooted.
This issue affects Omada EAP610 firmware versions prior to 1.6.0.
References
| Link | Resource |
|---|---|
| https://support.omadanetworks.com/en/product/eap610/v3/ | Product |
| https://support.omadanetworks.com/us/document/118100/ | Vendor Advisory |
| https://support.omadanetworks.com/us/product/eap610/v3/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-03-05 19:16
Updated : 2026-03-09 17:54
NVD link : CVE-2025-7375
Mitre link : CVE-2025-7375
CVE.ORG link : CVE-2025-7375
JSON object : View
Products Affected
tp-link
- omada_eap610_firmware
- omada_eap610
CWE
