Home

Description

A denial-of-service (DoS) vulnerability was identified in Omada EAP610 v3. An attacker with adjacent network access can send crafted requests to cause the device’s HTTP service to crash. This results in temporary service unavailability until the device is rebooted. This issue affects Omada EAP610 firmware versions prior to 1.6.0.

PUBLISHED Reserved 2025-07-09 | Published 2026-03-05 | Updated 2026-03-06 | Assigner TPLink




MEDIUM: 6.9CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

Any version before 1.6.0
affected

Credits

Felix Thümmler finder

References

support.omadanetworks.com/en/product/eap610/v3/ patch

support.omadanetworks.com/us/product/eap610/v3/ patch

support.omadanetworks.com/us/document/118100/ vendor-advisory

cve.org (CVE-2025-7375)

nvd.nist.gov (CVE-2025-7375)

Download JSON