{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-23T05:31:04.495","vulnerabilities":[{"cve":{"id":"CVE-2025-9292","sourceIdentifier":"f23511db-6c3e-4e32-a477-6aa17d310630","published":"2026-02-13T02:16:45.937","lastModified":"2026-04-01T20:52:43.110","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"A permissive web security configuration may allow cross-origin restrictions enforced by modern browsers to be bypassed under specific circumstances.  Exploitation requires the presence of an existing client-side injection vulnerability and user access to the affected web interface.  Successful exploitation could allow unauthorized disclosure of sensitive information. Fixed in updated Omada Cloud Controller service versions deployed automatically by TP‑Link. No user action is required."},{"lang":"es","value":"Una configuración de seguridad web permisiva puede permitir que las restricciones de origen cruzado impuestas por los navegadores modernos sean eludidas bajo circunstancias específicas. La explotación requiere la presencia de una vulnerabilidad de inyección del lado del cliente existente y acceso de usuario a la interfaz web afectada. La explotación exitosa podría permitir la divulgación no autorizada de información sensible. Corregido en versiones actualizadas del servicio Omada Cloud Controller desplegadas automáticamente por TP?Link. No se requiere ninguna acción del usuario."}],"metrics":{"cvssMetricV40":[{"source":"f23511db-6c3e-4e32-a477-6aa17d310630","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":2.0,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"PRESENT","privilegesRequired":"HIGH","userInteraction":"PASSIVE","vulnConfidentialityImpact":"LOW","vulnIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"f23511db-6c3e-4e32-a477-6aa17d310630","type":"Secondary","description":[{"lang":"en","value":"CWE-942"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:aginet:*:*:*:*:*:*:*:*","versionEndExcluding":"2.13.6","matchCriteriaId":"917B801C-D1EE-498D-9D89-7CD6FDF22096"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:deco:*:*:*:*:*:*:*:*","versionEndExcluding":"3.9.163","matchCriteriaId":"74600A45-B793-4C34-9C72-8BAED1555097"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:festa:*:*:*:*:*:*:*:*","versionEndExcluding":"1.7.1","matchCriteriaId":"8C4235A8-87CF-48F8-B0BD-96124FDA850B"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:kasa:*:*:*:*:*:*:*:*","versionEndExcluding":"3.4.350","matchCriteriaId":"27D5C0B8-67C4-440B-A0B5-B0B4E8126DC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:kidshield:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.21","matchCriteriaId":"E50BF815-D85D-437C-891E-61B49F6E9AC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:omada:*:*:*:*:*:*:*:*","versionEndExcluding":"4.25.25","matchCriteriaId":"6B2DD98D-424D-453A-B472-9E7349E4B887"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:omada_guard:*:*:*:*:*:*:*:*","versionEndExcluding":"1.1.28","matchCriteriaId":"1EE9425F-E87A-4C39-8F4D-3CEEC10B92D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:tapo:*:*:*:*:*:*:*:*","versionEndExcluding":"3.14.111","matchCriteriaId":"857482B8-F8BA-4F53-BE48-55FC91FD32CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:tether:*:*:*:*:*:*:*:*","versionEndExcluding":"4.12.27","matchCriteriaId":"50BFDEFF-D76D-4AAB-8DDB-4620F5584A08"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:tp-partner:*:*:*:*:*:*:*:*","versionEndExcluding":"2.0.1","matchCriteriaId":"682309A2-16A9-483F-A789-0C1A412A7005"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:tpcamera:*:*:*:*:*:*:*:*","versionEndExcluding":"3.2.17","matchCriteriaId":"BE3C3AA7-1F72-466B-B0AA-F26D43E4A301"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:vigi:*:*:*:*:*:*:*:*","versionEndExcluding":"2.7.70","matchCriteriaId":"3563E8AC-D931-4C07-BD5F-D35DB9BC8456"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:wi-fi_navi:*:*:*:*:*:*:*:*","versionEndExcluding":"1.5.5","matchCriteriaId":"51EF281C-A391-49C2-A826-F2C2E46D820D"},{"vulnerable":true,"criteria":"cpe:2.3:a:tp-link:wifi_toolkit:*:*:*:*:*:*:*:*","versionEndExcluding":"1.4.28","matchCriteriaId":"BFD2DCF8-1D59-478F-868D-3D503D68B009"}]}]}],"references":[{"url":"https://www.omadanetworks.com/us/support/faq/4969/","source":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Vendor Advisory"]},{"url":"https://www.tp-link.com/us/support/faq/4969/","source":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Vendor Advisory"]}]}}]}