CVE-2025-9521
Unknown Unknown - Not Provided
Password Confirmation Bypass in Omada Controllers Enables Account Takeover

Publication date: 2026-01-26

Last updated on: 2026-03-11

Assigner: TPLink

Description
Password Confirmation Bypass vulnerability in Omada Controllers, allowing an attacker with a valid session token to bypass secondary verification, and change the user’s password without proper confirmation, leading to weakened account security.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-26
Last Modified
2026-03-11
Generated
2026-05-07
AI Q&A
2026-01-26
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
tp-link omada_controller to 6.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-522 The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Password Confirmation Bypass in Omada Controllers. It allows an attacker who already has a valid session token to bypass the secondary verification step and change the user's password without proper confirmation. This means the attacker can alter account credentials without the usual security checks.


How can this vulnerability impact me? :

The vulnerability can weaken account security by allowing unauthorized password changes without proper confirmation. An attacker with a valid session token could take over user accounts, potentially leading to unauthorized access and control over the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart