CVE-2026-1668
CRITICAL WAF: Medium
CVSS 9.8
Published: 2026-03-13
CWE-20
The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests. Under specific conditions, this flaw may result in unintended command execution.
An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure. Successful exploitation may allow remote code execution or denial-of-service.
WAF Coverage Analysis
Improper Input Validation
Medium WAF Coverage
OWASP: A03:2021 Injection
920xxx - Protocol Enforcement 941xxx - XSS / XXE 942xxx - SQL Injection
Affected Software
| Vendor | Product | Version |
|---|---|---|
| tp-link | omada_sg2005p-pd_firmware | 1.0.0 - 1.0.19 |
| tp-link | omada_sg2008_firmware | 4.20.0 - 4.20.17 |
| tp-link | omada_sg2008_firmware | 4.30.0 - 4.30.1 |
| tp-link | omada_sg2008p_firmware | 3.20.0 - 3.20.17 |
| tp-link | omada_sg2008p_firmware | 3.30.0 - 3.30.1 |
| tp-link | omada_sg2016p_firmware | 1.20.0 - 1.20.17 |
| tp-link | omada_sg2016p_firmware | 1.30.0 - 1.30.1 |
| tp-link | omada_sg2210mp_firmware | 4.20.0 - 4.20.18 |
| tp-link | omada_sg2210mp_firmware | 5.0.0 - 5.0.15 |
| tp-link | omada_sg2210mp_firmware | 5.20.0 - 5.20.1 |
References
- support.omadanetworks.com (Product)
- support.omadanetworks.com (Product)
- support.omadanetworks.com (Vendor Advisory)
- support.omadanetworks.com (Product)