A Cross-Site Scripting (XSS) vulnerability was identified in a parameter in Omada Controllers due to improper input sanitization. Exploitation requires advanced conditions, such as network positioning or emulating a trusted entity, and user interaction by an authenticated administrator. If successful, an attacker could execute arbitrary JavaScript in the administrator’s browser, potentially exposing sensitive information and compromising confidentiality.
References
| Link | Resource |
|---|---|
| https://support.omadanetworks.com/us/document/114950/ | Vendor Advisory |
| https://support.omadanetworks.com/us/download/ | Product |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
| AND |
|
Configuration 3 (hide)
| AND |
|
Configuration 4 (hide)
| AND |
|
Configuration 5 (hide)
| AND |
|
Configuration 6 (hide)
| AND |
|
Configuration 7 (hide)
| AND |
|
History
No history.
Information
Published : 2026-01-22 22:16
Updated : 2026-03-16 18:06
NVD link : CVE-2025-9289
Mitre link : CVE-2025-9289
CVE.ORG link : CVE-2025-9289
JSON object : View
Products Affected
tp-link
- oc220
- oc200_firmware
- oc300_firmware
- oc400_firmware
- oc300
- omada_controller
- oc200
- oc220_firmware
- oc400
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
