Password Confirmation Bypass vulnerability in Omada Controllers, allowing an attacker with a valid session token to bypass secondary verification, and change the user’s password without proper confirmation, leading to weakened account security.
History

Mon, 26 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
Description Password Confirmation Bypass vulnerability in Omada Controllers, allowing an attacker with a valid session token to bypass secondary verification, and change the user’s password without proper confirmation, leading to weakened account security.
Title Password Confirmation Bypass in Omada Controller
Weaknesses CWE-522
References
Metrics cvssV4_0

{'score': 2.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-01-26T19:35:26.711Z

Reserved: 2025-08-27T02:22:06.982Z

Link: CVE-2025-9521

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-26T20:16:08.927

Modified: 2026-01-26T20:16:08.927

Link: CVE-2025-9521

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.