Blind Server-Side Request Forgery (SSRF) in Omada Controllers through webhook functionality, enabling crafted requests to internal services, which may lead to enumeration of information.
References
| Link | Resource |
|---|---|
| https://https://support.omadanetworks.com/us/download/software/omada-controller/ | Broken Link |
| https://support.omadanetworks.com/us/document/115200/ | Vendor Advisory |
Configurations
History
11 Mar 2026, 22:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://https://support.omadanetworks.com/us/download/software/omada-controller/ - Broken Link | |
| References | () https://support.omadanetworks.com/us/document/115200/ - Vendor Advisory | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| CPE | cpe:2.3:o:tp-link:omada_controller:*:*:*:*:*:*:*:* | |
| First Time |
Tp-link
Tp-link omada Controller |
|
| Summary |
|
26 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-26 20:16
Updated : 2026-03-11 22:30
NVD link : CVE-2025-9522
Mitre link : CVE-2025-9522
CVE.ORG link : CVE-2025-9522
JSON object : View
Products Affected
tp-link
- omada_controller
CWE
CWE-918
Server-Side Request Forgery (SSRF)
