CVE-2025-9521
Password Confirmation Bypass in Omada Controllers Enables Account Takeover
Publication date: 2026-01-26
Last updated on: 2026-03-11
Assigner: TPLink
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| tp-link | omada_controller | to 6.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-522 | The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Password Confirmation Bypass in Omada Controllers. It allows an attacker who already has a valid session token to bypass the secondary verification step and change the user's password without proper confirmation. This means the attacker can alter account credentials without the usual security checks.
How can this vulnerability impact me? :
The vulnerability can weaken account security by allowing unauthorized password changes without proper confirmation. An attacker with a valid session token could take over user accounts, potentially leading to unauthorized access and control over the affected system.