An authentication weakness was identified in Omada Controllers, Gateways and Access Points, controller-device adoption due to improper handling of random values. Exploitation requires advanced network positioning and allows an attacker to intercept adoption traffic and forge valid authentication through offline precomputation, potentially exposing sensitive information and compromising confidentiality.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 22 Jan 2026 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An authentication weakness was identified in Omada Controllers, Gateways and Access Points, controller-device adoption due to improper handling of random values. Exploitation requires advanced network positioning and allows an attacker to intercept adoption traffic and forge valid authentication through offline precomputation, potentially exposing sensitive information and compromising confidentiality. | |
| Title | Authentication Weakness on Omada Controllers, Gateways and Access Points | |
| Weaknesses | CWE-760 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-01-22T23:14:45.823Z
Reserved: 2025-08-20T22:24:20.340Z
Link: CVE-2025-9290
No data.
Status : Received
Published: 2026-01-23T00:15:52.093
Modified: 2026-01-23T00:15:52.093
Link: CVE-2025-9290
No data.
OpenCVE Enrichment
No data.
Weaknesses