Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2025-9290


An authentication weakness was identified in Omada Controllers, Gateways and Access Points, controller-device adoption due to improper handling of random values. Exploitation requires advanced network positioning and allows an attacker to intercept adoption traffic and forge valid authentication through offline precomputation, potentially exposing sensitive information and compromising confidentiality.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 5.9, indicating it can be exploited remotely over the network but requires specific conditions to be met without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts confidentiality (data exposure), for affected systems. Impacting 111 products from tp-link, from tp-link, from tp-link and 108 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2026, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2026-01-23T00:15:52.093

Last Modified

2026-03-16T18:07:14.757

Status

Analyzed

Source

f23511db-6c3e-4e32-a477-6aa17d310630

Severity

CVSSv3.1: 5.9 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-760
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application tp-link omada_controller < 6.0.0.24 Yes
Application tp-link omada_controller < 6.0.0.100 Yes
Operating System tp-link oc200_firmware < 1.37.9 Yes
Hardware tp-link oc200 1 No
Operating System tp-link oc220_firmware < 1.1.3 Yes
Hardware tp-link oc220 1 No
Operating System tp-link oc300_firmware < 1.31.9 Yes
Hardware tp-link oc300 1.6 No
Operating System tp-link oc400_firmware < 1.9.9 Yes
Hardware tp-link oc400 1.6 No
Operating System tp-link oc200_firmware < 2.22.9 Yes
Hardware tp-link oc200 2 No
Operating System tp-link oc220_firmware - Yes
Hardware tp-link oc220 2 No
Operating System tp-link er605_firmware < 2.3.2 Yes
Hardware tp-link er605 2.0 No
Operating System tp-link er7206_firmware < 2.2.2 Yes
Hardware tp-link er7206 2.0 No
Operating System tp-link er7406_firmware < 1.2.2 Yes
Hardware tp-link er7406 - No
Operating System tp-link er707-m2_firmware < 1.3.1 Yes
Hardware tp-link er707-m2 - No
Operating System tp-link er7412-m2_firmware < 1.1.0 Yes
Hardware tp-link er7412-m2 - No
Operating System tp-link er8411_firmware < 1.3.5 Yes
Hardware tp-link er8411 - No
Operating System tp-link er706w_firmware < 1.2.1 Yes
Hardware tp-link er706w - No
Operating System tp-link er706w-4g_firmware < 1.2.1 Yes
Hardware tp-link er706w-4g - No
Operating System tp-link er706wp-4g_firmware < 1.1.0 Yes
Hardware tp-link er706wp-4g - No
Operating System tp-link er703wp-4g-outdoor_firmware < 1.1.0 Yes
Hardware tp-link er703wp-4g-outdoor - No
Operating System tp-link dr3220v-4g_firmware < 1.1.0 Yes
Hardware tp-link dr3220v-4g - No
Operating System tp-link dr3650v-4g_firmware < 1.1.0 Yes
Hardware tp-link dr3650v-4g - No
Operating System tp-link dr3650v_firmware < 1.1.0 Yes
Hardware tp-link dr3650v - No
Operating System tp-link er701-5g-outdoor_firmware < 1.0.0 Yes
Hardware tp-link er701-5g-outdoor - No
Operating System tp-link er605w_firmware < 2.0.2 Yes
Hardware tp-link er605w 2.0 No
Operating System tp-link er7212pc_firmware < 2.2.1 Yes
Hardware tp-link er7212pc 2.0 No
Operating System tp-link fr365_firmware < 1.1.10 Yes
Hardware tp-link fr365 - No
Operating System tp-link g36w-4g_firmware < 1.1.5 Yes
Hardware tp-link g36w-4g - No
Operating System tp-link eap655-wall_firmware < 1.6.2 Yes
Hardware tp-link eap655-wall 1.0 No
Operating System tp-link eap660_hd_firmware < 1.6.1 Yes
Hardware tp-link eap660_hd 1.0 No
Hardware tp-link eap660_hd 2.0 No
Operating System tp-link eap620_hd_firmware < 1.6.1 Yes
Hardware tp-link eap620_hd 3.0 No
Hardware tp-link eap620_hd 3.20 No
Operating System tp-link eap610-outdoor_firmware < 1.6.1 Yes
Hardware tp-link eap610-outdoor 1.0 No
Hardware tp-link eap610-outdoor 1.20 No
Operating System tp-link eap610_firmware < 1.6.1 Yes
Hardware tp-link eap610 1.0 No
Hardware tp-link eap610 2.0 No
Operating System tp-link eap623-outdoor_hd_firmware < 1.6.1 Yes
Hardware tp-link eap623-outdoor_hd 1.0 No
Operating System tp-link eap625-outdoor_hd_firmware < 1.6.1 Yes
Hardware tp-link eap625-outdoor_hd 1.0 No
Operating System tp-link eap772_firmware < 1.3.2 Yes
Hardware tp-link eap772 2.0 No
Operating System tp-link eap772-outdoor_firmware < 1.3.2 Yes
Hardware tp-link eap772-outdoor 1.0 No
Operating System tp-link eap770_firmware < 1.3.2 Yes
Hardware tp-link eap770 2.0 No
Operating System tp-link eap723_firmware < 1.3.2 Yes
Hardware tp-link eap723 1.0 No
Operating System tp-link eap773_firmware < 1.1.2 Yes
Hardware tp-link eap773 1.0 No
Operating System tp-link eap783_firmware < 1.1.2 Yes
Hardware tp-link eap783 1.0 No
Operating System tp-link eap772_firmware < 1.1.2 Yes
Hardware tp-link eap772 1.0 No
Operating System tp-link eap787_firmware < 1.1.2 Yes
Hardware tp-link eap787 1.0 No
Operating System tp-link eap720_firmware < 1.1.2 Yes
Hardware tp-link eap720 1.0 No
Operating System tp-link eap723_firmware < 1.1.2 Yes
Hardware tp-link eap723 2.0 No
Operating System tp-link eap725-wall_firmware < 1.1.2 Yes
Hardware tp-link eap725-wall 1.0 No
Operating System tp-link eap215_bridge_kit_firmware < 1.1.4 Yes
Hardware tp-link eap215_bridge_kit 3.0 No
Operating System tp-link eap211_bridge_kit_firmware < 1.1.4 Yes
Hardware tp-link eap211_bridge_kit 3.0 No
Operating System tp-link beam_bridge_5_ur_firmware < 1.1.5 Yes
Hardware tp-link beam_bridge_5_ur 1.0 No
Operating System tp-link eap603gp-desktop_firmware < 1.1.0 Yes
Hardware tp-link eap603gp-desktop 1.0 No
Operating System tp-link eap615gp-wall_firmware < 1.1.0 Yes
Hardware tp-link eap615gp-wall 1.0 No
Hardware tp-link eap615gp-wall 1.20 No
Operating System tp-link eap625gp-wall_firmware < 1.1.0 Yes
Hardware tp-link eap625gp-wall 1.0 No
Hardware tp-link eap625gp-wall 1.20 No
Operating System tp-link eap610gp-desktop_firmware < 1.1.0 Yes
Hardware tp-link eap610gp-desktop 1.0 No
Hardware tp-link eap610gp-desktop 1.20 No
Hardware tp-link eap610gp-desktop 1.26 No
Operating System tp-link eap650gp-desktop_firmware < 1.0.1 Yes
Hardware tp-link eap650gp-desktop 1.0 No
Operating System tp-link eap653_firmware < 1.3.3 Yes
Hardware tp-link eap653 1.0 No
Operating System tp-link eap650-outdoor_firmware < 1.3.3 Yes
Hardware tp-link eap650-outdoor 1.0 No
Operating System tp-link eap230-wall_firmware < 3.3.1 Yes
Hardware tp-link eap230-wall 1.0 No
Operating System tp-link eap235-wall_firmware < 3.3.1 Yes
Hardware tp-link eap235-wall 1.0 No
Operating System tp-link eap603-outdoor_firmware < 1.5.1 Yes
Hardware tp-link eap603-outdoor 1.0 No
Operating System tp-link eap653_ur_firmware < 1.4.2 Yes
Hardware tp-link eap653_ur 1.0 No
Operating System tp-link eap650-desktop_firmware < 1.1.0 Yes
Hardware tp-link eap650-desktop 1.0 No
Operating System tp-link eap615-wall_firmware < 1.1.0 Yes
Hardware tp-link eap615-wall 1.0 No
Operating System tp-link eap100-bridge_kit_firmware < 1.0.3 Yes
Hardware tp-link eap100-bridge_kit 1.0 No
Operating System tp-link er706w-4g_firmware < 2.1.0 Yes
Hardware tp-link er706w-4g 2.0 No
Application tp-link omada_controller < 6.0.0.34 Yes
Hardware tp-link oc200 1 No
Hardware tp-link oc200 2 No
Hardware tp-link oc300 1.6 No
Hardware tp-link oc400 1.6 No
Application tp-link omada_controller < 5.15.24 Yes
Hardware tp-link oc220 1 No
Hardware tp-link oc220 2 No

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For tp-link's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.