CVE-2026-1668

9.8 CRITICAL
Published: March 13, 2026 Modified: April 02, 2026
View on NVD

Description

The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests. Under specific conditions, this flaw may result in unintended command execution.<br>An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure. Successful exploitation may allow remote code execution or denial-of-service.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://support.omadanetworks.com/au/download/firmware/
Source: f23511db-6c3e-4e32-a477-6aa17d310630
Product
https://support.omadanetworks.com/en/download/firmware/
Source: f23511db-6c3e-4e32-a477-6aa17d310630
Product
https://support.omadanetworks.com/us/document/118794/
Source: f23511db-6c3e-4e32-a477-6aa17d310630
Vendor Advisory
https://support.omadanetworks.com/us/product/
Source: f23511db-6c3e-4e32-a477-6aa17d310630
Product

4 reference(s) from NVD

Quick Stats

CVSS v3 Score
9.8 / 10.0
EPSS (Exploit Probability)
0.4%
59th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

tp-link