CVE-2025-9521

Password Confirmation Bypass vulnerability in Omada Controllers, allowing an attacker with a valid session token to bypass secondary verification, and change the user’s password without proper confirmation, leading to weakened account security.
Configurations

Configuration 1 (hide)

cpe:2.3:o:tp-link:omada_controller:*:*:*:*:*:*:*:*

History

11 Mar 2026, 22:43

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
Summary
  • (es) Vulnerabilidad de omisión de confirmación de contraseña en controladores Omada, permitiendo a un atacante con un token de sesión válido omitir la verificación secundaria y cambiar la contraseña del usuario sin la confirmación adecuada, lo que lleva a una seguridad de cuenta debilitada.
First Time Tp-link
Tp-link omada Controller
References () https://support.omadanetworks.com/us/document/115200/ - () https://support.omadanetworks.com/us/document/115200/ - Vendor Advisory
References () https://support.omadanetworks.com/us/download/software/omada-controller/ - () https://support.omadanetworks.com/us/download/software/omada-controller/ - Product
CPE cpe:2.3:o:tp-link:omada_controller:*:*:*:*:*:*:*:*

26 Jan 2026, 20:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-26 20:16

Updated : 2026-03-11 22:43


NVD link : CVE-2025-9521

Mitre link : CVE-2025-9521

CVE.ORG link : CVE-2025-9521


JSON object : View

Products Affected

tp-link

  • omada_controller
CWE
CWE-522

Insufficiently Protected Credentials