Tp-link

Omada Controller

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 13.02.2026 00:21:24
  • Zuletzt bearbeitet 13.02.2026 23:16:08

A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing client-side injection vulnerability and user acces...

  • EPSS 0.04%
  • Veröffentlicht 26.01.2026 19:35:59
  • Zuletzt bearbeitet 11.03.2026 22:30:19

Blind Server-Side Request Forgery (SSRF) in Omada Controllers through webhook functionality, enabling crafted requests to internal services, which may lead to enumeration of information.

  • EPSS 0.03%
  • Veröffentlicht 26.01.2026 19:35:26
  • Zuletzt bearbeitet 11.03.2026 22:43:08

Password Confirmation Bypass vulnerability in Omada Controllers, allowing an attacker with a valid session token to bypass secondary verification, and change the user’s password without proper confirmation, leading to weakened account security.

  • EPSS 0.01%
  • Veröffentlicht 26.01.2026 19:34:44
  • Zuletzt bearbeitet 11.03.2026 22:43:57

An IDOR vulnerability exists in Omada Controllers that allows an attacker with Administrator permissions to manipulate requests and potentially hijack the Owner account.

  • EPSS 0.03%
  • Veröffentlicht 22.01.2026 23:14:45
  • Zuletzt bearbeitet 16.03.2026 18:07:14

An authentication weakness was identified in Omada Controllers, Gateways and Access Points, controller-device adoption due to improper handling of random values. Exploitation requires advanced network positioning and allows an attacker to intercept a...

  • EPSS 0.01%
  • Veröffentlicht 22.01.2026 21:48:35
  • Zuletzt bearbeitet 16.03.2026 18:06:44

A Cross-Site Scripting (XSS) vulnerability was identified in a parameter in Omada Controllers due to improper input sanitization. Exploitation requires advanced conditions, such as network positioning or emulating a trusted entity, and user interacti...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 04.05.2020 14:15:13
  • Zuletzt bearbeitet 21.11.2024 04:59:46

TP-Link Omada Controller Software 3.2.6 allows Directory Traversal for reading arbitrary files via com.tp_link.eap.web.portal.PortalController.getAdvertiseFile in /opt/tplink/EAPController/lib/eap-web-3.2.6.jar.