CVE-2025-9293

A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication. An attacker in a privileged network position may be able to intercept or modify traffic if they can position themselves within the communication channel. Successful exploitation may compromise confidentiality, integrity, and availability of application data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tp-link:aginet:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:deco:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:festa:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:kasa:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:kidshield:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:omada:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:omada_guard:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tapo:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tether:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tp-partner:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tpcamera:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:vigi:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:wi-fi_navi:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:wifi_toolkit:*:*:*:*:*:*:*:*

History

01 Apr 2026, 20:49

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad en la lógica de validación de certificados puede permitir a las aplicaciones aceptar identidades de servidor no confiables o validadas incorrectamente durante la comunicación TLS. Un atacante en una posición de red privilegiada puede ser capaz de interceptar o modificar el tráfico si pueden posicionarse dentro del canal de comunicación. La explotación exitosa puede comprometer la confidencialidad, la integridad y la disponibilidad de los datos de la aplicación.
First Time Tp-link tether
Tp-link
Tp-link kasa
Tp-link festa
Tp-link omada Guard
Tp-link wifi Toolkit
Tp-link deco
Tp-link kidshield
Tp-link tapo
Tp-link omada
Tp-link aginet
Tp-link tp-partner
Tp-link wi-fi Navi
Tp-link vigi
Tp-link tpcamera
References () https://www.omadanetworks.com/us/support/faq/4969/ - () https://www.omadanetworks.com/us/support/faq/4969/ - Vendor Advisory
References () https://www.tp-link.com/us/support/faq/4969/ - () https://www.tp-link.com/us/support/faq/4969/ - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.1
CPE cpe:2.3:a:tp-link:wi-fi_navi:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:omada_guard:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:festa:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tp-partner:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tapo:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tether:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:omada:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:wifi_toolkit:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:kidshield:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:aginet:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:kasa:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tpcamera:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:deco:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:vigi:*:*:*:*:*:*:*:*

13 Feb 2026, 23:16

Type Values Removed Values Added
References
  • () https://www.omadanetworks.com/us/support/faq/4969/ -

13 Feb 2026, 02:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-13 02:16

Updated : 2026-04-01 20:49


NVD link : CVE-2025-9293

Mitre link : CVE-2025-9293

CVE.ORG link : CVE-2025-9293


JSON object : View

Products Affected

tp-link

  • tpcamera
  • wifi_toolkit
  • tether
  • vigi
  • festa
  • wi-fi_navi
  • omada
  • omada_guard
  • kasa
  • deco
  • kidshield
  • aginet
  • tp-partner
  • tapo
CWE
CWE-295

Improper Certificate Validation