Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9290: CWE-760 Use of a One-Way Hash with a Predictable Salt in TP-Link Systems Inc. Omada Software Controller

0
Medium
VulnerabilityCVE-2025-9290cvecve-2025-9290cwe-760
Published: Thu Jan 22 2026 (01/22/2026, 23:14:45 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Omada Software Controller

Description

CVE-2025-9290 is a medium-severity vulnerability in TP-Link Omada Software Controller and related devices caused by the use of a one-way hash with a predictable salt during controller-device adoption. This flaw allows attackers with advanced network positioning to intercept adoption traffic and perform offline precomputation to forge valid authentication tokens. Exploitation could lead to unauthorized device adoption, exposing sensitive information and compromising confidentiality. No known exploits are currently in the wild, and no patches have been released yet. The vulnerability does not require user interaction or privileges but demands high attack complexity and local network access. European organizations using Omada Controllers in their network infrastructure could face risks of unauthorized network device control and data exposure. Mitigation involves network segmentation, strict access controls, monitoring adoption traffic, and applying vendor updates once available. Countries with significant TP-Link market share and critical infrastructure deployments, such as Germany, France, UK, and the Netherlands, are most likely affected. Given the impact on confidentiality and the difficulty of exploitation, the severity is medium.

AI-Powered Analysis

AILast updated: 01/22/2026, 23:50:14 UTC

Technical Analysis

CVE-2025-9290 is a vulnerability identified in TP-Link Systems Inc.'s Omada Software Controller and associated Gateways and Access Points. The root cause is the use of a one-way hash function combined with a predictable salt during the device adoption process, which is a critical step where the controller authenticates and integrates new devices into the network. This predictable salt undermines the randomness expected in cryptographic operations, enabling attackers positioned within the network to intercept the adoption traffic. By capturing this traffic, attackers can perform offline precomputation attacks to forge valid authentication tokens, effectively bypassing the intended authentication mechanisms. The vulnerability falls under CWE-760, which relates to the use of a one-way hash with a predictable salt, a known cryptographic weakness. Exploitation requires advanced network positioning, such as being on the same local network segment or having the ability to intercept traffic between the controller and devices. The CVSS v4.0 score is 6.0 (medium), reflecting the high attack complexity and the absence of required privileges or user interaction. The impact primarily affects confidentiality, as unauthorized adoption could expose sensitive network configuration data or allow malicious devices to join the network. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed proactively.

Potential Impact

For European organizations, this vulnerability poses a risk to network security and confidentiality. Omada Controllers are commonly used in enterprise and SMB environments for centralized management of wireless access points and gateways. Successful exploitation could allow attackers to impersonate legitimate devices, gain unauthorized network access, and potentially exfiltrate sensitive information or disrupt network operations. This is particularly concerning for sectors with stringent data protection requirements such as finance, healthcare, and government. The need for advanced network positioning limits the attack surface to internal or compromised networks, but insider threats or lateral movement by attackers could facilitate exploitation. The absence of known exploits currently reduces immediate risk, but the public disclosure increases the likelihood of future attacks. Organizations relying on Omada infrastructure should consider this vulnerability a significant threat to their network integrity and confidentiality.

Mitigation Recommendations

1. Network Segmentation: Isolate Omada Controllers and associated devices on dedicated management VLANs with strict access controls to limit exposure to untrusted networks. 2. Access Control: Restrict network access to the controller and adoption traffic to authorized personnel and systems only, using firewall rules and NAC (Network Access Control) solutions. 3. Traffic Monitoring: Implement deep packet inspection and anomaly detection to identify unusual adoption traffic or attempts to intercept controller-device communications. 4. Vendor Updates: Monitor TP-Link advisories closely and apply security patches or firmware updates promptly once released. 5. Cryptographic Hardening: Advocate for or implement additional cryptographic protections such as mutual authentication or use of unpredictable salts if vendor updates are delayed. 6. Incident Response Preparation: Develop and test incident response plans focused on detecting and mitigating unauthorized device adoption or network infiltration. 7. Physical Security: Ensure physical security of network infrastructure to prevent attackers from gaining local network access required for exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-08-20T22:24:20.340Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6972b45c4623b1157c9773aa

Added to database: 1/22/2026, 11:35:56 PM

Last enriched: 1/22/2026, 11:50:14 PM

Last updated: 1/23/2026, 8:34:24 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats