Password Confirmation Bypass vulnerability in Omada Controllers, allowing an attacker with a valid session token to bypass secondary verification, and change the user’s password without proper confirmation, leading to weakened account security.
References
| Link | Resource |
|---|---|
| https://support.omadanetworks.com/us/document/115200/ | Vendor Advisory |
| https://support.omadanetworks.com/us/download/software/omada-controller/ | Product |
Configurations
History
No history.
Information
Published : 2026-01-26 20:16
Updated : 2026-03-11 22:43
NVD link : CVE-2025-9521
Mitre link : CVE-2025-9521
CVE.ORG link : CVE-2025-9521
JSON object : View
Products Affected
tp-link
- omada_controller
CWE
CWE-522
Insufficiently Protected Credentials
