VYPR
High severity7.5NVD Advisory· Published Feb 13, 2026· Updated Apr 1, 2026

CVE-2025-9292

CVE-2025-9292

Description

A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances. Exploitation requires the presence of an existing client-side injection vulnerability and user access to the affected web interface. Successful exploitation could allow unauthorized disclosure of sensitive information. Fixed in updated Omada Cloud Controller service versions deployed automatically by TP‑Link. No user action is required.

Affected products

14
  • cpe:2.3:a:tp-link:aginet:*:*:*:*:*:*:*:*
    Range: <2.13.6
  • cpe:2.3:a:tp-link:deco:*:*:*:*:*:*:*:*
    Range: <3.9.163
  • cpe:2.3:a:tp-link:festa:*:*:*:*:*:*:*:*
    Range: <1.7.1
  • cpe:2.3:a:tp-link:kasa:*:*:*:*:*:*:*:*
    Range: <3.4.350
  • cpe:2.3:a:tp-link:kidshield:*:*:*:*:*:*:*:*
    Range: <1.1.21
  • cpe:2.3:a:tp-link:omada:*:*:*:*:*:*:*:*
    Range: <4.25.25
  • cpe:2.3:a:tp-link:omada_guard:*:*:*:*:*:*:*:*
    Range: <1.1.28
  • cpe:2.3:a:tp-link:tapo:*:*:*:*:*:*:*:*
    Range: <3.14.111
  • cpe:2.3:a:tp-link:tether:*:*:*:*:*:*:*:*
    Range: <4.12.27
  • cpe:2.3:a:tp-link:tp-partner:*:*:*:*:*:*:*:*
    Range: <2.0.1
  • cpe:2.3:a:tp-link:tpcamera:*:*:*:*:*:*:*:*
    Range: <3.2.17
  • cpe:2.3:a:tp-link:vigi:*:*:*:*:*:*:*:*
    Range: <2.7.70
  • cpe:2.3:a:tp-link:wi-fi_navi:*:*:*:*:*:*:*:*
    Range: <1.5.5
  • cpe:2.3:a:tp-link:wifi_toolkit:*:*:*:*:*:*:*:*
    Range: <1.4.28

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.