A denial-of-service (DoS) vulnerability was identified in Omada EAP610 v3. An attacker with adjacent network access can send crafted requests to cause the device’s HTTP service to crash. This results in temporary service unavailability until the device is rebooted.
This issue affects Omada EAP610 firmware versions prior to 1.6.0.
References
| Link | Resource |
|---|---|
| https://support.omadanetworks.com/en/product/eap610/v3/ | Product |
| https://support.omadanetworks.com/us/document/118100/ | Vendor Advisory |
| https://support.omadanetworks.com/us/product/eap610/v3/ | Product |
Configurations
Configuration 1 (hide)
| AND |
|
History
09 Mar 2026, 17:54
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
| Summary |
|
|
| First Time |
Tp-link
Tp-link omada Eap610 Firmware Tp-link omada Eap610 |
|
| CPE | cpe:2.3:o:tp-link:omada_eap610_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:omada_eap610:3:*:*:*:*:*:*:* |
|
| References | () https://support.omadanetworks.com/en/product/eap610/v3/ - Product | |
| References | () https://support.omadanetworks.com/us/document/118100/ - Vendor Advisory | |
| References | () https://support.omadanetworks.com/us/product/eap610/v3/ - Product |
05 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 19:16
Updated : 2026-03-09 17:54
NVD link : CVE-2025-7375
Mitre link : CVE-2025-7375
CVE.ORG link : CVE-2025-7375
JSON object : View
Products Affected
tp-link
- omada_eap610
- omada_eap610_firmware
CWE
