Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7375: CWE-20 Improper Input Validation in TP-Link Systems Inc. EAP610 v3

0
Medium
VulnerabilityCVE-2025-7375cvecve-2025-7375cwe-20
Published: Thu Mar 05 2026 (03/05/2026, 17:47:56 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: EAP610 v3

Description

A denial-of-service (DoS) vulnerability was identified in Omada EAP610 v3. An attacker with adjacent network access can send crafted requests to cause the device’s HTTP service to crash. This results in temporary service unavailability until the device is rebooted. This issue affects Omada EAP610 firmware versions prior to 1.6.0.

AI-Powered Analysis

AILast updated: 03/05/2026, 18:37:21 UTC

Technical Analysis

CVE-2025-7375 is a denial-of-service vulnerability identified in TP-Link Systems Inc.'s Omada EAP610 v3 wireless access point devices. The root cause is improper input validation (CWE-20) in the device's HTTP service, which handles management and configuration requests. An attacker with adjacent network access—meaning they must be on the same local network or connected via a bridged network segment—can send specially crafted HTTP requests designed to exploit this flaw. These malformed requests cause the HTTP service to crash, leading to a denial-of-service condition where the device becomes temporarily unavailable until it is rebooted. The vulnerability affects firmware versions prior to 1.6.0, indicating that the vendor has addressed the issue in later firmware releases. The CVSS v4.0 base score is 6.9 (medium severity), reflecting that the attack vector is adjacent network (AV:A), with low attack complexity (AC:L), no privileges required (PR:L), no user interaction (UI:N), and a high impact on availability (VA:H). Confidentiality and integrity impacts are none. No known exploits have been reported in the wild, but the vulnerability could be leveraged by malicious insiders or attackers who gain local network access. The lack of authentication requirement for the attack increases risk in environments where network segmentation or access controls are weak. This vulnerability highlights the importance of robust input validation in embedded device management services to prevent service disruption.

Potential Impact

The primary impact of CVE-2025-7375 is the temporary denial of wireless network availability due to the crash of the HTTP management service on affected Omada EAP610 v3 devices. This can disrupt business operations relying on wireless connectivity, including enterprise communications, guest access, and IoT device connectivity. In environments where these devices serve critical roles, such as hospitals, educational institutions, or corporate offices, the disruption could lead to productivity losses and operational delays. Although the attack does not compromise confidentiality or integrity, the availability impact can facilitate secondary attacks by creating network blind spots or forcing fallback to less secure connectivity methods. The requirement for adjacent network access limits remote exploitation but does not eliminate risk in poorly segmented networks or environments with insider threats. Organizations with large deployments of these devices may face increased risk of widespread disruption if multiple devices are targeted simultaneously. The absence of known exploits reduces immediate risk but should not lead to complacency given the medium severity and ease of triggering the condition.

Mitigation Recommendations

1. Upgrade all affected Omada EAP610 v3 devices to firmware version 1.6.0 or later as soon as the vendor releases the patch to address this vulnerability. 2. Implement strict network segmentation to limit access to management interfaces only to trusted administrators and systems, reducing the risk of adjacent network attackers. 3. Disable or restrict HTTP management access where possible, favoring more secure protocols such as HTTPS with strong authentication. 4. Monitor network traffic for unusual or malformed HTTP requests targeting the devices’ management interfaces to detect potential exploitation attempts. 5. Employ network access control (NAC) solutions to prevent unauthorized devices from connecting to the local network segments hosting these access points. 6. Regularly audit firmware versions and device configurations to ensure compliance with security best practices. 7. Educate network administrators about the risk of local network attacks and the importance of physical and logical access controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-07-09T00:57:53.077Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a9c994460e1c85df139338

Added to database: 3/5/2026, 6:21:08 PM

Last enriched: 3/5/2026, 6:37:21 PM

Last updated: 3/5/2026, 9:06:33 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses