Omada Tp Link Omada

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Tp Link Omada.

By the Year

In 2026 there have been 7 vulnerabilities in Tp Link Omada. Last year, in 2025 Omada had 2 security vulnerabilities published. That is, 5 more vulnerabilities have already been reported in 2026 as compared to last year.

Year Vulnerabilities Average Score
2026 7 0.00
2025 2 0.00
2024 6 7.20

It may take a day or so for new Omada vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Tp Link Omada Security Vulnerabilities

TLS Cert Validation Flaw Enabling Acceptance of Untrusted Server Identities
CVE-2025-9293 - February 13, 2026

A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication. An attacker in a privileged network position may be able to intercept or modify traffic if they can position themselves within the communication channel. Successful exploitation may compromise confidentiality, integrity, and availability of application data.

Improper Certificate Validation

TP-Link Omada Cloud Controller CORS Bypass
CVE-2025-9292 - February 13, 2026

A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing client-side injection vulnerability and user access to the affected web interface. Successful exploitation could allow unauthorized disclosure of sensitive information. Fixed in updated Omada Cloud Controller service versions deployed automatically by TPLink. No user action is required.

Permissive Cross-domain Policy with Untrusted Domains

Blind SSRF via Webhook in TP-Link Omada Controllers
CVE-2025-9522 - January 26, 2026

Blind Server-Side Request Forgery (SSRF) in Omada Controllers through webhook functionality, enabling crafted requests to internal services, which may lead to enumeration of information.

SSRF

TP-Link Omada Controller Password Confirmation Bypass
CVE-2025-9521 - January 26, 2026

Password Confirmation Bypass vulnerability in Omada Controllers, allowing an attacker with a valid session token to bypass secondary verification, and change the users password without proper confirmation, leading to weakened account security.

Insufficiently Protected Credentials

IDOR in TP-Link Omada Controller Enables Admin to Hijack Owner
CVE-2025-9520 - January 26, 2026

An IDOR vulnerability exists in Omada Controllers that allows an attacker with Administrator permissions to manipulate requests and potentially hijack the Owner account.

Insecure Direct Object Reference / IDOR

Authentication Bypass via Offline Precomputation in TP-Link Omada Devices
CVE-2025-9290 - January 22, 2026

An authentication weakness was identified in Omada Controllers, Gateways and Access Points, controller-device adoption due to improper handling of random values. Exploitation requires advanced network positioning and allows an attacker to intercept adoption traffic and forge valid authentication through offline precomputation, potentially exposing sensitive information and compromising confidentiality.

Use of a One-Way Hash with a Predictable Salt

Omada Controller XSS via admin param allows JS exec
CVE-2025-9289 - January 22, 2026

A Cross-Site Scripting (XSS) vulnerability was identified in a parameter in Omada Controllers due to improper input sanitization. Exploitation requires advanced conditions, such as network positioning or emulating a trusted entity, and user interaction by an authenticated administrator. If successful, an attacker could execute arbitrary JavaScript in the administrators browser, potentially exposing sensitive information and compromising confidentiality.

XSS

Omada Gateway Root Shell Escalation via Restricted Condition
CVE-2025-7851 - October 21, 2025

An attacker may obtain the root shell on the underlying OS system with the restricted conditions on Omada gateways.

Improper Privilege Management

Command injection in Omada Gateway web portal
CVE-2025-7850 - October 21, 2025

A command injection vulnerability may be exploited after the admin's authentication on the web portal on Omada gateways.

Shell injection

TP-Link ER7206 1.3.0 post-auth command injection via ipsec policy
CVE-2023-47209 7.2 - High - February 06, 2024

A post authentication command injection vulnerability exists in the ipsec policy functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.

Shell injection

TP-Link ER7206 Omada 1.3.0 Command Injection via Web Group Member
CVE-2023-47617 7.2 - High - February 06, 2024

A post authentication command injection vulnerability exists when configuring the web group member of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.

Shell injection

TP-Link ER7206 1.3.0 Command Execution via Web Filtering (HTTP)
CVE-2023-47618 7.2 - High - February 06, 2024

A post authentication command execution vulnerability exists in the web filtering functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

Shell injection

Cmd Inject in TP-Link ER7206 1.3.0 PPTP Client
CVE-2023-36498 7.2 - High - February 06, 2024

A post-authentication command injection vulnerability exists in the PPTP client functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability and gain access to an unrestricted shell.

Shell injection

HTTP POST Command Injection in TP-Link ER7206 1.3.0
CVE-2023-42664 7.2 - High - February 06, 2024

A post authentication command injection vulnerability exists when setting up the PPTP global configuration of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command injection. An attacker can make an authenticated HTTP request to trigger this vulnerability.

Shell injection

Arbitrary cmd exec in Tp-Link ER7206 Omada Router v1.3.0 (guest res)
CVE-2023-43482 7.2 - High - February 06, 2024

A command execution vulnerability exists in the guest resource functionality of Tp-Link ER7206 Omada Gigabit VPN Router 1.3.0 build 20230322 Rel.70591. A specially crafted HTTP request can lead to arbitrary command execution. An attacker can make an authenticated HTTP request to trigger this vulnerability.

Shell injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Tp Link Omada or by Tp Link? Click the Watch button to subscribe.

Tp Link
Vendor

Tp Link Omada
Product

subscribe