VYPR
High severity8.1NVD Advisory· Published Feb 13, 2026· Updated Apr 1, 2026

CVE-2025-9293

CVE-2025-9293

Description

A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication. An attacker in a privileged network position may be able to intercept or modify traffic if they can position themselves within the communication channel. Successful exploitation may compromise confidentiality, integrity, and availability of application data.

Affected products

14
  • cpe:2.3:a:tp-link:aginet:*:*:*:*:*:*:*:*
    Range: <2.13.6
  • cpe:2.3:a:tp-link:deco:*:*:*:*:*:*:*:*
    Range: <3.9.163
  • cpe:2.3:a:tp-link:festa:*:*:*:*:*:*:*:*
    Range: <1.7.1
  • cpe:2.3:a:tp-link:kasa:*:*:*:*:*:*:*:*
    Range: <3.4.350
  • cpe:2.3:a:tp-link:kidshield:*:*:*:*:*:*:*:*
    Range: <1.1.21
  • cpe:2.3:a:tp-link:omada:*:*:*:*:*:*:*:*
    Range: <4.25.25
  • cpe:2.3:a:tp-link:omada_guard:*:*:*:*:*:*:*:*
    Range: <1.1.28
  • cpe:2.3:a:tp-link:tapo:*:*:*:*:*:*:*:*
    Range: <3.14.111
  • cpe:2.3:a:tp-link:tether:*:*:*:*:*:*:*:*
    Range: <4.12.27
  • cpe:2.3:a:tp-link:tpcamera:*:*:*:*:*:*:*:*
    Range: <3.2.17
  • cpe:2.3:a:tp-link:tp-partner:*:*:*:*:*:*:*:*
    Range: <2.0.1
  • cpe:2.3:a:tp-link:vigi:*:*:*:*:*:*:*:*
    Range: <2.7.70
  • cpe:2.3:a:tp-link:wi-fi_navi:*:*:*:*:*:*:*:*
    Range: <1.5.5
  • cpe:2.3:a:tp-link:wifi_toolkit:*:*:*:*:*:*:*:*
    Range: <1.4.28

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.