A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication. An attacker in a privileged network position may be able to intercept or modify traffic if they can position themselves within the communication channel. Successful exploitation may compromise confidentiality, integrity, and availability of application data.
References
| Link | Resource |
|---|---|
| https://www.omadanetworks.com/us/support/faq/4969/ | Vendor Advisory |
| https://www.tp-link.com/us/support/faq/4969/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
01 Apr 2026, 20:49
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| First Time |
Tp-link tether
Tp-link Tp-link kasa Tp-link festa Tp-link omada Guard Tp-link wifi Toolkit Tp-link deco Tp-link kidshield Tp-link tapo Tp-link omada Tp-link aginet Tp-link tp-partner Tp-link wi-fi Navi Tp-link vigi Tp-link tpcamera |
|
| References | () https://www.omadanetworks.com/us/support/faq/4969/ - Vendor Advisory | |
| References | () https://www.tp-link.com/us/support/faq/4969/ - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
| CPE | cpe:2.3:a:tp-link:wi-fi_navi:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:omada_guard:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:festa:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:tp-partner:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:tapo:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:tether:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:omada:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:wifi_toolkit:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:kidshield:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:aginet:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:kasa:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:tpcamera:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:deco:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:vigi:*:*:*:*:*:*:*:* |
13 Feb 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
13 Feb 2026, 02:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-13 02:16
Updated : 2026-04-01 20:49
NVD link : CVE-2025-9293
Mitre link : CVE-2025-9293
CVE.ORG link : CVE-2025-9293
JSON object : View
Products Affected
tp-link
- tpcamera
- wifi_toolkit
- tether
- vigi
- festa
- wi-fi_navi
- omada
- omada_guard
- kasa
- deco
- kidshield
- aginet
- tp-partner
- tapo
CWE
CWE-295
Improper Certificate Validation
