A Cross-Site Scripting (XSS) vulnerability was identified in a parameter in Omada Controllers due to improper input sanitization. Exploitation requires advanced conditions, such as network positioning or emulating a trusted entity, and user interaction by an authenticated administrator. If successful, an attacker could execute arbitrary JavaScript in the administrator’s browser, potentially exposing sensitive information and compromising confidentiality.
History

Mon, 16 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link oc200
Tp-link oc200 Firmware
Tp-link oc220
Tp-link oc220 Firmware
Tp-link oc300
Tp-link oc300 Firmware
Tp-link oc400
Tp-link oc400 Firmware
CPEs cpe:2.3:a:tp-link:omada_controller:*:*:*:*:-:*:*:*
cpe:2.3:a:tp-link:omada_controller:*:*:*:*:cloud:*:*:*
cpe:2.3:h:tp-link:oc200:1:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:oc200:2:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:oc220:1:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:oc300:1.6:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:oc400:1.6:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:oc200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:oc220_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:oc300_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:oc400_firmware:*:*:*:*:*:*:*:*
Vendors & Products Tp-link oc200
Tp-link oc200 Firmware
Tp-link oc220
Tp-link oc220 Firmware
Tp-link oc300
Tp-link oc300 Firmware
Tp-link oc400
Tp-link oc400 Firmware
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Fri, 23 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 23 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link omada Controller
Tp-link omada Software Controller
Vendors & Products Tp-link
Tp-link omada Controller
Tp-link omada Software Controller

Thu, 22 Jan 2026 23:00:00 +0000

Type Values Removed Values Added
Description A Cross-Site Scripting (XSS) vulnerability was identified in a parameter in Omada Controllers due to improper input sanitization. Exploitation requires advanced conditions, such as network positioning or emulating a trusted entity, and user interaction by an authenticated administrator. If successful, an attacker could execute arbitrary JavaScript in the administrator’s browser, potentially exposing sensitive information and compromising confidentiality.
Title Cross-Site Scripting (XSS) on Omada Controllers
Weaknesses CWE-79
References
Metrics cvssV4_0

{'score': 5.7, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:A/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-01-23T20:16:00.912Z

Reserved: 2025-08-20T22:24:18.301Z

Link: CVE-2025-9289

cve-icon Vulnrichment

Updated: 2026-01-23T20:15:57.740Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-22T22:16:15.787

Modified: 2026-03-16T18:06:44.293

Link: CVE-2025-9289

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-23T10:27:20Z