Project Subscriptions
| Vendors | Products |
|---|---|
|
Tp-link
Subscribe
|
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link aginet
Tp-link deco Tp-link festa Tp-link kasa Tp-link kidshield Tp-link omada Tp-link omada Guard Tp-link tapo Tp-link tether Tp-link tp-partner Tp-link tpcamera Tp-link vigi Tp-link wi-fi Navi Tp-link wifi Toolkit |
|
| CPEs | cpe:2.3:a:tp-link:aginet:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:deco:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:festa:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:kasa:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:kidshield:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:omada:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:omada_guard:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:tapo:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:tether:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:tp-partner:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:tpcamera:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:vigi:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:wi-fi_navi:*:*:*:*:*:*:*:* cpe:2.3:a:tp-link:wifi_toolkit:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link aginet
Tp-link deco Tp-link festa Tp-link kasa Tp-link kidshield Tp-link omada Tp-link omada Guard Tp-link tapo Tp-link tether Tp-link tp-partner Tp-link tpcamera Tp-link vigi Tp-link wi-fi Navi Tp-link wifi Toolkit |
|
| Metrics |
cvssV3_1
|
Fri, 13 Feb 2026 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link omada Cloud Controller |
|
| Vendors & Products |
Tp-link
Tp-link omada Cloud Controller |
Fri, 13 Feb 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 13 Feb 2026 01:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing client-side injection vulnerability and user access to the affected web interface. Successful exploitation could allow unauthorized disclosure of sensitive information. Fixed in updated Omada Cloud Controller service versions deployed automatically by TP‑Link. No user action is required. | |
| Title | Permissive Web Security Policy Allows Cross-Origin Access Control Bypass on Omada Cloud Controllers | |
| Weaknesses | CWE-942 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-02-13T22:09:17.957Z
Reserved: 2025-08-20T22:24:24.501Z
Link: CVE-2025-9292
Updated: 2026-02-13T13:18:23.720Z
Status : Analyzed
Published: 2026-02-13T02:16:45.937
Modified: 2026-04-01T20:52:43.110
Link: CVE-2025-9292
No data.
OpenCVE Enrichment
Updated: 2026-02-13T21:28:53Z