{"api_version":"1","generated_at":"2026-04-23T01:19:01+00:00","cve":"CVE-2026-1668","urls":{"html":"https://cve.report/CVE-2026-1668","api":"https://cve.report/api/cve/CVE-2026-1668.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-1668","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-1668"},"summary":{"title":"Input Validation Vulnerability on Multiple Omada Switches","description":"The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests.  Under specific conditions, this flaw may result in unintended command execution.<br>An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure.  Successful exploitation may allow remote code execution or denial-of-service.","state":"PUBLISHED","assigner":"TPLink","published_at":"2026-03-13 19:53:58","updated_at":"2026-04-02 15:03:02"},"problem_types":["CWE-20","CWE-787","CWE-20 CWE-20 Improper Input Validation"],"metrics":[{"version":"4.0","source":"f23511db-6c3e-4e32-a477-6aa17d310630","type":"Secondary","score":"7.7","severity":"HIGH","vector":"CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","data":{"version":"4.0","vectorString":"CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"ADJACENT","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}},{"version":"4.0","source":"CNA","type":"CVSS","score":"7.7","severity":"HIGH","vector":"CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","data":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":7.7,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"}},{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"9.8","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}}],"references":[{"url":"https://support.omadanetworks.com/us/document/118794/","name":"https://support.omadanetworks.com/us/document/118794/","refsource":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Vendor Advisory"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.omadanetworks.com/au/download/firmware/","name":"https://support.omadanetworks.com/au/download/firmware/","refsource":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.omadanetworks.com/en/download/firmware/","name":"https://support.omadanetworks.com/en/download/firmware/","refsource":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://support.omadanetworks.com/us/product/","name":"https://support.omadanetworks.com/us/product/","refsource":"f23511db-6c3e-4e32-a477-6aa17d310630","tags":["Product"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-1668","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-1668","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2008P 3.2x","version":"affected 3.20.17 Build 20260121 Rel.53429 custom","platforms":["SG2008P(UN) hardware version 3.20","SG2008P(UN) hardware version 3.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2008P 3.3x","version":"affected 3.30.1 Build 20260127 Rel.32017 custom","platforms":["SG2008P(UN) hardware version 3.30","SG2008P(UN) hardware version 3.36","SG2008P(EU) hardware version 3.36"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SX3016F 1.3x","version":"affected 1.30.1 Build 20260129 Rel.8831 custom","platforms":["SX3016F(UN) hardware version 1.30","SX3016F(UN) hardware version 1.36","SX3016F(IN) hardware version 1.38"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SX3016F 1.2x","version":"affected 1.20.16 Build 20260121 Rel.57953 custom","platforms":["SX3016F(UN) hardware version 1.20","SX3016F(UN) hardware version 1.26","SX3016F(IN) hardware version 1.28"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428 2.4x","version":"affected 2.40.1 Build 20260127 Rel.39545 custom","platforms":["SG3428(UN) 2.40","SG3428(UN) 2.46","SG3428(BR) 2.46","SG3428(IN) 2.48"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428XMP 3.3x","version":"affected 3.30.1 Build 20260127 Rel.39545 custom","platforms":["SG3428XMP(UN) 3.30","SG3428XMP(UN) 3.36","SG3428XMP(EU) 3.36","SG3428XMP(IN) 3.38"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428X 1.4x","version":"affected 1.40.1 Build 20260127 Rel.39545 custom","platforms":["SG3428X(UN) 1.40","SG3428X(UN) 1.46","SG3428X(EU) 1.46","SG3428X(IN) 1.48"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428XF 1.3x","version":"affected 1.30.1 Build 20260127 Rel.39545 custom","platforms":["SG3428XF(UN) 1.30","SG3428XF(UN) 1.36","SG3428XF(IN) 1.38"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3452P 3.4x","version":"affected 3.40.1 Build 20260128 Rel.7041 custom","platforms":["SG3452P(UN) 3.40","SG3452P(UN) 3.46","SG3452P(IN) 3.48"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428MP 6.3x","version":"affected 6.30.1 Build 20260127 Rel.39545 custom","platforms":["SG3428MP(UN) 6.30","SG3428MP(UN) 6.36","SG3428MP(BR) 6.36","SG3428MP(IN) 6.38","SG3428MP(EU) 6.36"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2218P 2.2x","version":"affected 2.20.2 Build 20260127 Rel.32017 custom","platforms":["SG2218P(UN) 2.20","SG2218P(UN) 2.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2016P 1.3x","version":"affected 1.30.1 Build 20260127 Rel.32017 custom","platforms":["SG2016P(UN) 1.30","SG2016P(UN) 1.36"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3452XP 2.3x","version":"affected 2.30.1 Build 20260128 Rel.8721 custom","platforms":["SG3452XP(UN) 2.30","SG3452XP(UN) 2.36","SG3452XP(IN) 2.38"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428XMPP 1.2x","version":"affected 1.20.1 Build 20260127 Rel.39545 custom","platforms":["SG3428XMPP(UN) 1.20","SG3428XMPP(UN) 1.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3452X 1.3x","version":"affected 1.30.1 Build 20260128 Rel.8721 custom","platforms":["SG3452X(UN) 1.30","SG3452X(UN) 1.36","SG3452X(IN) 1.38"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2008 4.3x","version":"affected 4.30.1 Build 20260127 Rel.32017 custom","platforms":["SG2008(UN) 4.30","SG2008(UN) 4.36"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3210 3.3x","version":"affected 3.30.1 Build 20260206 Rel.33103 custom","platforms":["SG3210(UN) 3.30","SG3210(UN) 3.36","SG3210(IN) 3.38"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2210MP 5.2x","version":"affected 5.20.1 Build 20260127 Rel.32017 custom","platforms":["SG2210MP(UN) 5.20","SG2210MP(IN) 5.28","SG2210MP(EU) 5.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2210P 5.3x","version":"affected 5.30.1 Build 20260127 Rel.32017 custom","platforms":["SG2210P(UN) 5.30","SG2210P(UN) 5.36","SG2210P(BR) 5.36","SG2210P(IN) 5.38","SG2210P(EU) 5.36"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2218 1.3x","version":"affected 1.30.1 Build 20260127 Rel.32017 custom","platforms":["SG2218(UN) 1.30","SG2218(UN) 1.36"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3452 1.3x","version":"affected 1.30.1 Build 20260128 Rel.7041 custom","platforms":["SG3452(UN) 1.30","SG3452(UN) 1.36","SG3452(IN) 1.38"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3210X-M2 1.2x","version":"affected 1.20.1 Build 20260129 Rel.13605 custom","platforms":["SG3210X-M2(UN) 1.20","SG3210X-M2(UN) 1.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2210XMP-M2 1.x","version":"affected 1.0.19 Build 20260121 Rel.53314 custom","platforms":["SG2210XMP-M2(UN) 1.0","SG2210XMP-M2(UN) 1.6"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2008 4.2x","version":"affected 4.20.17 Build 20260121 Rel.53429 custom","platforms":["SG2008(UN) 4.20","SG2008(UN) 4.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2218P 1.2x","version":"affected 1.20.17 Build 20260121 Rel.53429 custom","platforms":["SG2218P(UN) 1.20","SG2218P(UN) 1.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3210 3.2x","version":"affected 3.20.17 Build 20260121 Rel.53429 custom","platforms":["SG3210(UN) 3.20","SG3210(IN) 3.28","SG3210(UN) 3.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428X-M2 1.2x","version":"affected 1.20.18 Build 20260121 Rel.54271 custom","platforms":["SG3428X-M2(UN) 1.20","SG3428X-M2(UN) 1.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SX3832MPP 1.x","version":"affected 1.0.11 Build 20260121 Rel.56907 custom","platforms":["SX3832MPP(UN) 1.0","SX3832MPP(UN) 1.6"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2218 1.2x","version":"affected 1.20.17 Build 20260121 Rel.53429 custom","platforms":["SG2218(UN) 1.20","SG2218(UN) 1.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SX3832 1.x","version":"affected 1.0.12 Build 20260121 Rel.56907 custom","platforms":["SX3832(UN) 1.0","SX3832(UN) 1.6"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2428LP 1.x","version":"affected 1.0.15 Build 20260121 Rel.53429 custom","platforms":["SG2428LP(UN) 1.0","SG2428LP(UN) 1.6","SG2428LP(IN) 1.8"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SL2428P 6.2x","version":"affected 6.20.18 Build 20260121 Rel.53429 custom","platforms":["SL2428P(UN) 6.20","SL2428P(UN) 6.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3218XP-M2 1.x","version":"affected 1.0.19 Build 20260121 Rel.53314 custom","platforms":["SG3218XP-M2(UN) 1.0","SG3218XP-M2(UN) 1.6"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3210XHP-M2 3.x","version":"affected 3.0.21 Build 20260121 Rel.53314 custom","platforms":["SG3210XHP-M2(UN) 3.0","SG3210XHP-M2(IN)3.8","SG3210XHP-M2(UN) 3.6"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2218P 2.x","version":"affected 2.0.14 Build 20260121 Rel.53429 custom","platforms":["SG2218P(UN) 2.0","SG2218P(UN) 2.6"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3210X-M2 1.x","version":"affected 1.0.19 Build 20260121 Rel.53314 custom","platforms":["SG3210X-M2(UN) 1.0","SG3210X-M2(UN) 1.6"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2428P 5.3x","version":"affected 5.30.16 Build 20260121 Rel.53429 custom","platforms":["SG2428P(UN) 5.30","SG2428P(UN) 5.32","SG2428P(IN) 5.33"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2210MP 4.2x","version":"affected 4.20.18 Build 20260121 Rel.53429 custom","platforms":["SG2210MP(UN) 4.20","SG2210MP(UN) 4.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3452P 3.3x","version":"affected 3.30.17 Build 20260121 Rel.54132 custom","platforms":["SG3452P(UN) 3.30","SG3452P(IN) 3.33","SG3452P(UN) 3.32"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3452 1.2x","version":"affected 1.20.17 Build 20260121 Rel.54132 custom","platforms":["SG3452(UN) 1.20","SG3452(IN) 1.28","SG3452(UN) 1.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2452LP 1.x","version":"affected 1.0.13 Build 20260121 Rel.54132 custom","platforms":["SG2452LP(UN) 1.0","SG2452LP(UN) 1.6","SG2452LP(IN) 1.8"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SX3032F 1.x","version":"affected 1.0.15 Build 20260121 Rel.56907 custom","platforms":["SX3032F(UN) 1.0","SX3032F(UN) 1.6"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3452X 1.2x","version":"affected 1.20.18 Build 20260121 Rel.55833 custom","platforms":["SG3452X(UN) 1.20","SG3452X(UN) 1.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3452XMPP 1.x","version":"affected 1.0.15 Build 20260121 Rel.55833 custom","platforms":["SG3452XMPP(UN) 1.0","SG3452XMPP(UN) 1.6","SG3452XMPP(IN) 1.8"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428XPP-M2 1.2x","version":"affected 1.20.19 Build 20260121 Rel.54271 custom","platforms":["SG3428XPP-M2(UN) 1.20","SG3428XPP-M2(UN) 1.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"TL-SG3452P 3.0","version":"affected 3.0.22 Build 20260121 Rel.54132 custom","platforms":["TL-SG3452P(UN) 3.0"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2428P 5.2x","version":"affected 5.20.20 Build 20260121 Rel.53429 custom","platforms":["SG2428P(UN) 5.20","SG2428P(UN) 5.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2210MP 5.x","version":"affected 5.0.15 Build 20260121 Rel.53429 custom","platforms":["SG2210MP(UN) 5.0","SG2210MP(IN) 5.8"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2005P-PD 1.x","version":"affected 1.0.19 Build 20260121 Rel.53429 custom","platforms":["SG2005P-PD(UN) 1.0","SG2005P-PD(UN) 1.6"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2016P 1.2x","version":"affected 1.20.17 Build 20260121 Rel.53429 custom","platforms":["SG2016P(UN) 1.20","SG2016P(UN) 1.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3452XP 2.2x","version":"affected 2.20.20 Build 20260121 Rel.55833 custom","platforms":["SG3452XP(UN) 2.20","SG3452XP(UN) 2.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428XMP 3.2x","version":"affected 3.20.21 Build 20260113 Rel.67732 custom","platforms":["SG3428XMP(UN) 3.20","SG3428XMP(IN) 3.28","SG3428XMP(UN) 3.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428X 1.3x","version":"affected 1.30.17 Build 20260113 Rel.67732 custom","platforms":["SG3428X(UN) 1.30","SG3428X(IN) 1.33","SG3428X(UN) 1.32"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428XF 1.2x","version":"affected 1.20.16 Build 20260113 Rel.67732 custom","platforms":["SG3428XF(UN) 1.20","SG3428XF(IN) 1.28","SG3428XF(UN) 1.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428MP 6.2x","version":"affected 6.20.20 Build 20260113 Rel.67732 custom","platforms":["SG3428MP(UN) 6.20","SG3428MP(IN) 6.28","SG3428MP(UN) 6.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"TL-SG3428MP 5.x","version":"affected 5.0.25 Build 20260113 Rel.67732 custom","platforms":["TL-SG3428MP(UN) 5.0","TL-SG3428MP(UN) 5.6","TL-SG3428MP(UN) 5.20","TL-SG3428MP(UN) 5.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428 2.3x","version":"affected 2.30.16 Build 20260113 Rel.67732 custom","platforms":["SG3428(UN) 2.30","SG3428(IN) 2.33","SG3428(UN) 2.32"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG3428XMPP 1.x","version":"affected 1.0.16 Build 20260113 Rel.67732 custom","platforms":["SG3428XMPP(UN) 1.0","SG3428XMPP(IN) 1.8","SG3428XMPP(UN) 1.6"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"TL-SG2428P 4.x","version":"affected 4.0.26 Build 20260121 Rel.53429 custom","platforms":["TL-SG2428P(UN) 4.0","TL-SG2428P(UN) 4.6"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SG2210P 5.2x","version":"affected 5.20.18 Build 20260121 Rel.53429 custom","platforms":["SG2210P(UN) 5.20","SG2210P(IN) 5.28","SG2210P(UN) 5.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SX3008F 1.2x","version":"affected custom","platforms":["SX3008F(UN) 1.20","SX3008F(IN)1.28","SX3008F(UN) 1.26"]},{"source":"CNA","vendor":"TP-Link Systems Inc.","product":"SX3206HPP 1.20","version":"affected custom","platforms":["SX3206HPP(UN) 1.20"]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"tangrs","lang":"en"}],"nvd_cpes":[{"cve_year":"2026","cve_id":"1668","vulnerable":"0","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"h","cpe4":"tp-link","cpe5":"omada_sg2005p-pd","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"1668","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"tp-link","cpe5":"omada_sg2005p-pd_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2026","cve_id":"1668","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"tp-link","cpe5":"omada_sg2008_firmware","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2026-1668","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","timestamp":"2026-03-13T18:09:19.359038Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2026-03-13T18:09:29.873Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["SG2008P(UN) hardware version 3.20","SG2008P(UN) hardware version 3.26"],"product":"SG2008P 3.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.20.17 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2008P(UN) hardware version 3.30","SG2008P(UN) hardware version 3.36","SG2008P(EU) hardware version 3.36"],"product":"SG2008P 3.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.30.1 Build 20260127 Rel.32017","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","packageName":"SX3016F(UN)/(IN) hardware 1.30/1.36/1.38","platforms":["SX3016F(UN) hardware version 1.30","SX3016F(UN) hardware version 1.36","SX3016F(IN) hardware version 1.38"],"product":"SX3016F 1.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.30.1 Build 20260129 Rel.8831","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SX3016F(UN) hardware version 1.20","SX3016F(UN) hardware version 1.26","SX3016F(IN) hardware version 1.28"],"product":"SX3016F 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.20.16 Build 20260121 Rel.57953","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428(UN) 2.40","SG3428(UN) 2.46","SG3428(BR) 2.46","SG3428(IN) 2.48"],"product":"SG3428 2.4x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"2.40.1 Build 20260127 Rel.39545","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428XMP(UN) 3.30","SG3428XMP(UN) 3.36","SG3428XMP(EU) 3.36","SG3428XMP(IN) 3.38"],"product":"SG3428XMP 3.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.30.1 Build 20260127 Rel.39545","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428X(UN) 1.40","SG3428X(UN) 1.46","SG3428X(EU) 1.46","SG3428X(IN) 1.48"],"product":"SG3428X 1.4x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.40.1 Build 20260127 Rel.39545","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428XF(UN) 1.30","SG3428XF(UN) 1.36","SG3428XF(IN) 1.38"],"product":"SG3428XF 1.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.30.1 Build 20260127 Rel.39545","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3452P(UN) 3.40","SG3452P(UN) 3.46","SG3452P(IN) 3.48"],"product":"SG3452P 3.4x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.40.1 Build 20260128 Rel.7041","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428MP(UN) 6.30","SG3428MP(UN) 6.36","SG3428MP(BR) 6.36","SG3428MP(IN) 6.38","SG3428MP(EU) 6.36"],"product":"SG3428MP 6.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"6.30.1 Build 20260127 Rel.39545","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2218P(UN) 2.20","SG2218P(UN) 2.26"],"product":"SG2218P 2.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"2.20.2 Build 20260127 Rel.32017","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2016P(UN) 1.30","SG2016P(UN) 1.36"],"product":"SG2016P 1.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.30.1 Build 20260127 Rel.32017","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3452XP(UN) 2.30","SG3452XP(UN) 2.36","SG3452XP(IN) 2.38"],"product":"SG3452XP 2.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"2.30.1 Build 20260128 Rel.8721","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428XMPP(UN) 1.20","SG3428XMPP(UN) 1.26"],"product":"SG3428XMPP 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.20.1 Build 20260127 Rel.39545","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3452X(UN) 1.30","SG3452X(UN) 1.36","SG3452X(IN) 1.38"],"product":"SG3452X 1.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.30.1 Build 20260128 Rel.8721","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2008(UN) 4.30","SG2008(UN) 4.36"],"product":"SG2008 4.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"4.30.1 Build 20260127 Rel.32017","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3210(UN) 3.30","SG3210(UN) 3.36","SG3210(IN) 3.38"],"product":"SG3210 3.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.30.1 Build 20260206 Rel.33103","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2210MP(UN) 5.20","SG2210MP(IN) 5.28","SG2210MP(EU) 5.26"],"product":"SG2210MP 5.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"5.20.1 Build 20260127 Rel.32017","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2210P(UN) 5.30","SG2210P(UN) 5.36","SG2210P(BR) 5.36","SG2210P(IN) 5.38","SG2210P(EU) 5.36"],"product":"SG2210P 5.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"5.30.1 Build 20260127 Rel.32017","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","packageName":"SG2218(UN) 1.30,SG2218(UN) 1.36","platforms":["SG2218(UN) 1.30","SG2218(UN) 1.36"],"product":"SG2218 1.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.30.1 Build 20260127 Rel.32017","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3452(UN) 1.30","SG3452(UN) 1.36","SG3452(IN) 1.38"],"product":"SG3452 1.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.30.1 Build 20260128 Rel.7041","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3210X-M2(UN) 1.20","SG3210X-M2(UN) 1.26"],"product":"SG3210X-M2 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.20.1 Build 20260129 Rel.13605","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2210XMP-M2(UN) 1.0","SG2210XMP-M2(UN) 1.6"],"product":"SG2210XMP-M2 1.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.0.19 Build 20260121 Rel.53314","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2008(UN) 4.20","SG2008(UN) 4.26"],"product":"SG2008 4.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"4.20.17 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2218P(UN) 1.20","SG2218P(UN) 1.26"],"product":"SG2218P 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.20.17 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3210(UN) 3.20","SG3210(IN) 3.28","SG3210(UN) 3.26"],"product":"SG3210 3.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.20.17 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428X-M2(UN) 1.20","SG3428X-M2(UN) 1.26"],"product":"SG3428X-M2 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.20.18 Build 20260121 Rel.54271","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SX3832MPP(UN) 1.0","SX3832MPP(UN) 1.6"],"product":"SX3832MPP 1.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.0.11 Build 20260121 Rel.56907","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2218(UN) 1.20","SG2218(UN) 1.26"],"product":"SG2218 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.20.17 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SX3832(UN) 1.0","SX3832(UN) 1.6"],"product":"SX3832 1.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.0.12 Build 20260121 Rel.56907","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2428LP(UN) 1.0","SG2428LP(UN) 1.6","SG2428LP(IN) 1.8"],"product":"SG2428LP 1.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.0.15 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SL2428P(UN) 6.20","SL2428P(UN) 6.26"],"product":"SL2428P 6.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"6.20.18 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3218XP-M2(UN) 1.0","SG3218XP-M2(UN) 1.6"],"product":"SG3218XP-M2 1.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.0.19 Build 20260121 Rel.53314","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3210XHP-M2(UN) 3.0","SG3210XHP-M2(IN)3.8","SG3210XHP-M2(UN) 3.6"],"product":"SG3210XHP-M2 3.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.0.21 Build 20260121 Rel.53314","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2218P(UN) 2.0","SG2218P(UN) 2.6"],"product":"SG2218P 2.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"2.0.14 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3210X-M2(UN) 1.0","SG3210X-M2(UN) 1.6"],"product":"SG3210X-M2 1.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.0.19 Build 20260121 Rel.53314","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2428P(UN) 5.30","SG2428P(UN) 5.32","SG2428P(IN) 5.33"],"product":"SG2428P 5.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"5.30.16 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2210MP(UN) 4.20","SG2210MP(UN) 4.26"],"product":"SG2210MP 4.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"4.20.18 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3452P(UN) 3.30","SG3452P(IN) 3.33","SG3452P(UN) 3.32"],"product":"SG3452P 3.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.30.17 Build 20260121 Rel.54132","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3452(UN) 1.20","SG3452(IN) 1.28","SG3452(UN) 1.26"],"product":"SG3452 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.20.17 Build 20260121 Rel.54132","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2452LP(UN) 1.0","SG2452LP(UN) 1.6","SG2452LP(IN) 1.8"],"product":"SG2452LP 1.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.0.13 Build 20260121 Rel.54132","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SX3032F(UN) 1.0","SX3032F(UN) 1.6"],"product":"SX3032F 1.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.0.15 Build 20260121 Rel.56907","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3452X(UN) 1.20","SG3452X(UN) 1.26"],"product":"SG3452X 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.20.18 Build 20260121 Rel.55833","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3452XMPP(UN) 1.0","SG3452XMPP(UN) 1.6","SG3452XMPP(IN) 1.8"],"product":"SG3452XMPP 1.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.0.15 Build 20260121 Rel.55833","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428XPP-M2(UN) 1.20","SG3428XPP-M2(UN) 1.26"],"product":"SG3428XPP-M2 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.20.19 Build 20260121 Rel.54271","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["TL-SG3452P(UN) 3.0"],"product":"TL-SG3452P 3.0","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.0.22 Build 20260121 Rel.54132","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2428P(UN) 5.20","SG2428P(UN) 5.26"],"product":"SG2428P 5.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"5.20.20 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2210MP(UN) 5.0","SG2210MP(IN) 5.8"],"product":"SG2210MP 5.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"5.0.15 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2005P-PD(UN) 1.0","SG2005P-PD(UN) 1.6"],"product":"SG2005P-PD 1.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.0.19 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2016P(UN) 1.20","SG2016P(UN) 1.26"],"product":"SG2016P 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.20.17 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3452XP(UN) 2.20","SG3452XP(UN) 2.26"],"product":"SG3452XP 2.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"2.20.20 Build 20260121 Rel.55833","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428XMP(UN) 3.20","SG3428XMP(IN) 3.28","SG3428XMP(UN) 3.26"],"product":"SG3428XMP 3.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.20.21 Build 20260113 Rel.67732","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428X(UN) 1.30","SG3428X(IN) 1.33","SG3428X(UN) 1.32"],"product":"SG3428X 1.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.30.17 Build 20260113 Rel.67732","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428XF(UN) 1.20","SG3428XF(IN) 1.28","SG3428XF(UN) 1.26"],"product":"SG3428XF 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.20.16 Build 20260113 Rel.67732","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428MP(UN) 6.20","SG3428MP(IN) 6.28","SG3428MP(UN) 6.26"],"product":"SG3428MP 6.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"6.20.20 Build 20260113 Rel.67732","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["TL-SG3428MP(UN) 5.0","TL-SG3428MP(UN) 5.6","TL-SG3428MP(UN) 5.20","TL-SG3428MP(UN) 5.26"],"product":"TL-SG3428MP 5.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"5.0.25 Build 20260113 Rel.67732","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG3428(UN) 2.30","SG3428(IN) 2.33","SG3428(UN) 2.32"],"product":"SG3428 2.3x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"2.30.16 Build 20260113 Rel.67732","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","packageName":"SG3428XMPP(UN) 1.0,SG3428XMPP(IN) 1.8,SG3428XMPP(UN) 1.6","platforms":["SG3428XMPP(UN) 1.0","SG3428XMPP(IN) 1.8","SG3428XMPP(UN) 1.6"],"product":"SG3428XMPP 1.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"1.0.16 Build 20260113 Rel.67732","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["TL-SG2428P(UN) 4.0","TL-SG2428P(UN) 4.6"],"product":"TL-SG2428P 4.x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"4.0.26 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SG2210P(UN) 5.20","SG2210P(IN) 5.28","SG2210P(UN) 5.26"],"product":"SG2210P 5.2x","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"5.20.18 Build 20260121 Rel.53429","status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SX3008F(UN) 1.20","SX3008F(IN)1.28","SX3008F(UN) 1.26"],"product":"SX3008F 1.2x","vendor":"TP-Link Systems Inc.","versions":[{"status":"affected","version":"0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["SX3206HPP(UN) 1.20"],"product":"SX3206HPP 1.20","vendor":"TP-Link Systems Inc.","versions":[{"status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"tangrs"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests.  Under specific conditions, this flaw may result in unintended command execution.&lt;br&gt;An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure.  Successful exploitation may allow remote code execution or denial-of-service."}],"value":"The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests.  Under specific conditions, this flaw may result in unintended command execution.<br>An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure.  Successful exploitation may allow remote code execution or denial-of-service."}],"impacts":[{"capecId":"CAPEC-787","descriptions":[{"lang":"en","value":"CAPEC-787 Out-of-Bounds Write"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":7.7,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-03-13T16:53:23.486Z","orgId":"f23511db-6c3e-4e32-a477-6aa17d310630","shortName":"TPLink"},"references":[{"tags":["patch"],"url":"https://support.omadanetworks.com/us/product/"},{"tags":["patch"],"url":"https://support.omadanetworks.com/au/download/firmware/"},{"tags":["patch"],"url":"https://support.omadanetworks.com/en/download/firmware/"},{"tags":["vendor-advisory"],"url":"https://support.omadanetworks.com/us/document/118794/"}],"source":{"discovery":"INTERNAL"},"title":"Input Validation Vulnerability on Multiple Omada Switches","x_generator":{"engine":"Vulnogram 0.5.0"}}},"cveMetadata":{"assignerOrgId":"f23511db-6c3e-4e32-a477-6aa17d310630","assignerShortName":"TPLink","cveId":"CVE-2026-1668","datePublished":"2026-03-13T16:53:23.486Z","dateReserved":"2026-01-29T21:44:58.903Z","dateUpdated":"2026-03-13T18:09:29.873Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-03-13 19:53:58","lastModifiedDate":"2026-04-02 15:03:02","problem_types":["CWE-20","CWE-787","CWE-20 CWE-20 Improper Input Validation"],"metrics":{"cvssMetricV40":[{"source":"f23511db-6c3e-4e32-a477-6aa17d310630","type":"Secondary","cvssData":{"version":"4.0","vectorString":"CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"ADJACENT","attackComplexity":"HIGH","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"NOT_DEFINED","confidentialityRequirement":"NOT_DEFINED","integrityRequirement":"NOT_DEFINED","availabilityRequirement":"NOT_DEFINED","modifiedAttackVector":"NOT_DEFINED","modifiedAttackComplexity":"NOT_DEFINED","modifiedAttackRequirements":"NOT_DEFINED","modifiedPrivilegesRequired":"NOT_DEFINED","modifiedUserInteraction":"NOT_DEFINED","modifiedVulnConfidentialityImpact":"NOT_DEFINED","modifiedVulnIntegrityImpact":"NOT_DEFINED","modifiedVulnAvailabilityImpact":"NOT_DEFINED","modifiedSubConfidentialityImpact":"NOT_DEFINED","modifiedSubIntegrityImpact":"NOT_DEFINED","modifiedSubAvailabilityImpact":"NOT_DEFINED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED"}}],"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2005p-pd_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.19","matchCriteriaId":"9F442622-A627-45A3-A268-52258945E3FD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2005p-pd:-:*:*:*:*:*:*:*","matchCriteriaId":"1E30DC41-D802-4A16-8192-161BF889AFCD"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2008_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20.0","versionEndExcluding":"4.20.17","matchCriteriaId":"78C14AB4-7326-4367-AEFC-8F741CB2CB1C"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2008_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.30.0","versionEndExcluding":"4.30.1","matchCriteriaId":"A7E0322E-ED92-4B48-9FE9-3C30F39F9710"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2008:-:*:*:*:*:*:*:*","matchCriteriaId":"2D360F8F-92C4-4ED9-95D0-8C1F6F2FEC8D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2008p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.20.0","versionEndExcluding":"3.20.17","matchCriteriaId":"EC9EFE7A-FF39-4B2E-82C1-04121C2C9D24"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2008p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.30.0","versionEndExcluding":"3.30.1","matchCriteriaId":"19BB14BE-02C6-47AD-8DCB-848263B5A812"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2008p:-:*:*:*:*:*:*:*","matchCriteriaId":"B45EE288-81F0-4FD5-970B-6663F54DBC35"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2016p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.17","matchCriteriaId":"1F8D1A0A-0718-4CAF-826C-7977702C0875"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2016p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.30.0","versionEndExcluding":"1.30.1","matchCriteriaId":"6F75416B-E723-475D-8C29-0A04F547A6D3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2016p:-:*:*:*:*:*:*:*","matchCriteriaId":"4290A113-B61D-4936-9D55-C1B49180DE82"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2210mp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.20.0","versionEndExcluding":"4.20.18","matchCriteriaId":"250A2C0E-7323-41E6-87DC-DA23AAF90F6E"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2210mp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.0.15","matchCriteriaId":"5495C962-135D-427C-91AD-CC773F487198"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2210mp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"5.20.0","versionEndExcluding":"5.20.1","matchCriteriaId":"8D024801-A31E-4480-828F-416655512E83"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2210mp:-:*:*:*:*:*:*:*","matchCriteriaId":"926000F4-0B81-4E0F-8232-860C2A2745D9"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2210p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"5.20.0","versionEndExcluding":"5.20.18","matchCriteriaId":"B0F700E3-E24D-4126-AD8B-F2D8EC2CD0DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2210p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"5.30.0","versionEndExcluding":"5.30.1","matchCriteriaId":"091AB8B5-E644-4A7E-B422-61E278D08EBE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2210p:-:*:*:*:*:*:*:*","matchCriteriaId":"D371E850-1A98-41A5-9A95-CBDE21A76ACE"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2210xmp-m2_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.19","matchCriteriaId":"E57BD2FD-8266-481E-9C06-724C5614F797"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2210xmp-m2:-:*:*:*:*:*:*:*","matchCriteriaId":"C4E197C0-81C4-4AA8-9E12-D4DB5A2928EC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2218_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.17","matchCriteriaId":"632C07BD-3245-49E2-82C7-C95199E83FBF"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2218_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.30.0","versionEndExcluding":"1.30.1","matchCriteriaId":"34921179-1C3C-4474-9A8C-76C772369E06"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2218:-:*:*:*:*:*:*:*","matchCriteriaId":"5D5D8075-5078-4A6F-8123-D321807DC786"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2218p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.17","matchCriteriaId":"46AB5247-1522-441B-B2E8-1E71974D2773"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2218p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndExcluding":"2.0.14","matchCriteriaId":"CAE05EAC-54C7-4EC0-91D5-E8A669DBFC88"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2218p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"2.20.0","versionEndExcluding":"2.20.2","matchCriteriaId":"87A33B95-0948-43AB-8B1F-2E01D1C47659"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2218p:-:*:*:*:*:*:*:*","matchCriteriaId":"378EAC66-B76A-4ECA-88CB-3F14985D8A68"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2428lp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.13","matchCriteriaId":"7FC2BE28-2831-4E9D-96B2-5F76D251B915"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2428lp:-:*:*:*:*:*:*:*","matchCriteriaId":"C1E3DDFC-E3D0-47EE-83EE-EC5B4CE4B489"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2428p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"5.20.0","versionEndExcluding":"5.20.20","matchCriteriaId":"D84F985C-7E47-4195-A110-696949E71770"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2428p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"5.30.0","versionEndExcluding":"5.30.16","matchCriteriaId":"24A0D662-A963-4434-92F2-004FFB3EE682"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2428p:-:*:*:*:*:*:*:*","matchCriteriaId":"51E52787-AE06-40E8-B753-3D2289FBE7C2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg2452lp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.13","matchCriteriaId":"B5DAF94C-3889-41EA-8793-F20552AB64FC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg2452lp:-:*:*:*:*:*:*:*","matchCriteriaId":"E463EE2C-9B8B-4AB8-B8E3-D586F4BEB8EC"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3210_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.20.0","versionEndExcluding":"3.20.17","matchCriteriaId":"86D1E164-A64A-4217-8A69-15FA28958159"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3210_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.30.0","versionEndExcluding":"3.30.1","matchCriteriaId":"AC10BE36-49C9-42ED-A9F7-32C0E319A1C7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3210:-:*:*:*:*:*:*:*","matchCriteriaId":"71DE9E85-0C50-4047-8CE7-EC54FB3A8F1E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3210xhp-m2_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.21","matchCriteriaId":"A1DB50B9-5DBB-46D9-AC53-4F3A814F8EDC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3210xhp-m2:-:*:*:*:*:*:*:*","matchCriteriaId":"5CDEA62A-71EE-4A25-AECE-19F4D0BE1E1F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3210x-m2_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.1","matchCriteriaId":"921AFD1B-F9D0-486C-A4B5-E1B053F6667C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3210x-m2:-:*:*:*:*:*:*:*","matchCriteriaId":"9562D570-5365-47F4-9A29-6D4079C6E1EF"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3218xp-m2_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.19","matchCriteriaId":"FE5F410D-06A3-4E7B-A1CD-2330EBF8BEE1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3218xp-m2:-:*:*:*:*:*:*:*","matchCriteriaId":"54B2B69D-6F92-4CA8-BAD5-B56E63169F5D"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"2.30.0","versionEndExcluding":"2.30.16","matchCriteriaId":"061F253D-D425-4ABD-852C-74B444749D23"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"2.40.0","versionEndExcluding":"2.40.1","matchCriteriaId":"E187948C-9AF3-41FC-88CF-560F667BED5E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3428:-:*:*:*:*:*:*:*","matchCriteriaId":"AD1C5645-5789-414A-980F-C943E0B2AD59"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428mp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"6.20.0","versionEndExcluding":"6.20.20","matchCriteriaId":"86664BB3-FB10-43B1-8F19-0BAE2E394F22"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428mp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"6.30.0","versionEndExcluding":"6.30.1","matchCriteriaId":"70747A4A-18EB-434B-9A54-3E3C52A363AC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3428mp:-:*:*:*:*:*:*:*","matchCriteriaId":"1B1579D0-F385-4909-871D-20309C36C549"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428x_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.30.0","versionEndExcluding":"1.30.17","matchCriteriaId":"5821EF1C-E18F-42F5-8414-CDF9C0426275"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428x_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.40.0","versionEndExcluding":"1.40.1","matchCriteriaId":"93170151-DE56-4418-821E-EE410462AA93"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3428x:-:*:*:*:*:*:*:*","matchCriteriaId":"00DFF5AB-3FD9-4E55-8C38-217D1828FEA9"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428xf_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.16","matchCriteriaId":"8E7ADAA5-8212-4DA0-BD36-CC580E7AE8F9"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428xf_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.30.0","versionEndExcluding":"1.30.1","matchCriteriaId":"BEBCE3C6-5845-47FB-9083-8184FCFEABDE"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3428xf:-:*:*:*:*:*:*:*","matchCriteriaId":"11906635-9EFA-4B5F-BDAC-C1A7E26BF000"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428x-m2_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.18","matchCriteriaId":"EB7D6F58-521B-46E1-B4B3-4D3061F220CA"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3428x-m2:-:*:*:*:*:*:*:*","matchCriteriaId":"502642DB-FF8E-4F7F-B565-83B3C2A991B4"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428xmp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.20.0","versionEndExcluding":"3.20.21","matchCriteriaId":"4746C846-0749-4F65-B9C4-55736215623B"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428xmp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.30.0","versionEndExcluding":"3.30.1","matchCriteriaId":"F19CA3D9-CEA5-4766-8956-61DA87281D06"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3428xmp:-:*:*:*:*:*:*:*","matchCriteriaId":"8B2A4332-30CA-485B-A70D-8EFD9C54EC58"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428xmpp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.16","matchCriteriaId":"B4B2A11B-58BB-477A-88BA-960411B615D8"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428xmpp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.1","matchCriteriaId":"67D7112F-4EC9-4544-A60B-80933896C9E7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3428xmpp:-:*:*:*:*:*:*:*","matchCriteriaId":"3678FDA8-8965-48FA-9D3B-6FDF1DB4B18F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3428xpp-m2_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.19","matchCriteriaId":"1646A141-C063-4B17-A960-05EE85A41C4B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3428xpp-m2:-:*:*:*:*:*:*:*","matchCriteriaId":"62CE4DBE-BA37-4ECA-A8B0-4CABEEC4470F"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3452_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.17","matchCriteriaId":"40E75594-8230-4ECA-A0DB-A2E4DD2E24E5"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3452_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.30.0","versionEndExcluding":"1.30.1","matchCriteriaId":"3CCE1D70-D3E2-4777-B72A-4F9F33740D94"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3452:-:*:*:*:*:*:*:*","matchCriteriaId":"7050BD01-596D-42B1-AAA9-470CFF33F64A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3452p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.30.0","versionEndExcluding":"3.30.17","matchCriteriaId":"1297948B-786C-4A87-AD96-9B7B5110A693"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3452p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.40.0","versionEndExcluding":"3.40.1","matchCriteriaId":"36F354A4-73B7-4E73-9900-AB659E719A71"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3452p:-:*:*:*:*:*:*:*","matchCriteriaId":"5B808CBF-10B8-4E0A-86E6-3936C39B98D7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3452x_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.18","matchCriteriaId":"E7139693-6A51-4A00-A4FB-9D70E015B220"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3452x_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.30.0","versionEndExcluding":"1.30.1","matchCriteriaId":"BCA5EC76-22F8-4543-AD58-707E97CCE19B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3452x:-:*:*:*:*:*:*:*","matchCriteriaId":"55C3A44F-0D3A-408E-AD90-CDA8001DEBC6"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3452xmpp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.15","matchCriteriaId":"EFC1C04B-C449-4E80-BBCD-86EA39A2219E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3452xmpp:-:*:*:*:*:*:*:*","matchCriteriaId":"B826EA38-D173-4331-A406-39DD4AB99AC2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3452xp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"2.20.0","versionEndExcluding":"2.20.20","matchCriteriaId":"E9AEFEF1-8513-4653-95C0-732B0C09B258"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sg3452xp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"2.30.0","versionEndExcluding":"2.30.1","matchCriteriaId":"6BCA7E5F-198B-434A-86E5-D498B55EB105"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sg3452xp:-:*:*:*:*:*:*:*","matchCriteriaId":"1863A24C-9CB3-42FB-8144-C63224D5B399"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sl2428p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"6.20.0","versionEndExcluding":"6.20.18","matchCriteriaId":"BF3463F2-C828-4663-8BF1-3480582B2174"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sl2428p:-:*:*:*:*:*:*:*","matchCriteriaId":"CA3A7E58-B90E-4623-A0C2-C0826F6B9B58"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sx3008f_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.12","matchCriteriaId":"9F2480D2-A33E-437F-8880-6A3EC05DA274"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sx3008f:-:*:*:*:*:*:*:*","matchCriteriaId":"D73C0E40-698E-433A-9125-801770D1164A"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sx3016f_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.16","matchCriteriaId":"7CFD7778-C51F-47C4-93CA-C1B9CB9F66C0"},{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sx3016f_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.30.0","versionEndExcluding":"1.30.1","matchCriteriaId":"70111915-F659-4287-B940-9A822C5CAD9C"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sx3016f:-:*:*:*:*:*:*:*","matchCriteriaId":"D814737F-44E5-4352-A37A-1C54EB8E41D7"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sx3032f_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.15","matchCriteriaId":"14C35B6E-BC52-4048-A048-DEDFE7036EF4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sx3032f:-:*:*:*:*:*:*:*","matchCriteriaId":"79CB0C2F-EF20-4685-A11B-EF0E59AE0AF2"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sx3206hpp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.20.0","versionEndExcluding":"1.20.12","matchCriteriaId":"644FA08E-2B0E-494A-9EE1-EB5AACB45DB3"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sx3206hpp:-:*:*:*:*:*:*:*","matchCriteriaId":"8D4B1462-A413-4834-9B93-D068AE96564E"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sx3832_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.12","matchCriteriaId":"E11AE377-EC29-4207-A497-4FA5DCCE23E4"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sx3832:-:*:*:*:*:*:*:*","matchCriteriaId":"41240976-9B4B-449B-A464-31AF774B29C9"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_sx3832mpp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"1.0.0","versionEndExcluding":"1.0.11","matchCriteriaId":"6BF5012F-EA43-4A3C-96F4-573B469E7D0B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_sx3832mpp:-:*:*:*:*:*:*:*","matchCriteriaId":"1A51079F-EEA0-4E29-AD44-D802F696180B"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_tl-sg2428p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0.0","versionEndExcluding":"4.0.26","matchCriteriaId":"532BB83D-FC0A-419A-B0BC-D0FA9D339B52"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_tl-sg2428p:-:*:*:*:*:*:*:*","matchCriteriaId":"54F0CFE5-2BB0-43DD-937A-334180200850"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_tl-sg3428mp_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"5.0.0","versionEndExcluding":"5.0.25","matchCriteriaId":"B7309CE7-FB5B-4FA4-B587-7330F60515C1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_tl-sg3428mp:-:*:*:*:*:*:*:*","matchCriteriaId":"A0E6DA7C-A923-48B0-B5F1-ABDA47C04E58"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:tp-link:omada_tl-sg3452p_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"3.0.0","versionEndExcluding":"3.0.22","matchCriteriaId":"3D53B71A-6528-47EE-8A21-B644EBB8AE50"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:tp-link:omada_tl-sg3452p:-:*:*:*:*:*:*:*","matchCriteriaId":"43DB8AA3-4E53-4384-A62C-A822D2B46C1C"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"1668","Ordinal":"1","Title":"Input Validation Vulnerability on Multiple Omada Switches","CVE":"CVE-2026-1668","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"1668","Ordinal":"1","NoteData":"The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests.  Under specific conditions, this flaw may result in unintended command execution.<br>An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure.  Successful exploitation may allow remote code execution or denial-of-service.","Type":"Description","Title":"Input Validation Vulnerability on Multiple Omada Switches"}]}}}