Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 11 Mar 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:tp-link:omada_controller:*:*:*:*:*:*:*:* | |
| Metrics |
cvssV3_1
|
Tue, 03 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 27 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link omada Controller |
|
| Vendors & Products |
Tp-link
Tp-link omada Controller |
Mon, 26 Jan 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Blind Server-Side Request Forgery (SSRF) in Omada Controllers through webhook functionality, enabling crafted requests to internal services, which may lead to enumeration of information. | |
| Title | Blind Server-Side Request Forgery (SSRF) in Omada Controller | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-02-03T19:08:42.704Z
Reserved: 2025-08-27T02:22:08.375Z
Link: CVE-2025-9522
Updated: 2026-02-03T19:08:32.356Z
Status : Analyzed
Published: 2026-01-26T20:16:09.070
Modified: 2026-03-11T22:30:19.880
Link: CVE-2025-9522
No data.
OpenCVE Enrichment
Updated: 2026-01-27T09:03:07Z