Security Advisory on Input Validation Vulnerability on Multiple Omada Switches (CVE-2026-1668)

Security Vulnerability
03-13-2026

Vulnerability and Impact Description:

CVE-2026-1668:

The web interface does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests. Under specific conditions, this flaw may result in unintended command execution.

An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure. Successful exploitation may allow remote code execution or denial-of-service.

CVSS v4.0 Score: 7.7 / High

CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Models

Hardware Branch

Fixed Version

SG2005P‑PD

1.x

1.0.19 Build 20260121 Rel.53429

SG2008

4.2x

4.20.17 Build 20260121 Rel.53429

SG2008

4.3x

4.30.1 Build 20260127 Rel.32017

SG2008P

3.2x

3.20.17 Build 20260121 Rel.53429

SG2008P

3.3x

3.30.1 Build 20260127 Rel.32017

SG2016P

1.2x

1.20.17 Build 20260121 Rel.53429

SG2016P

1.3x

1.30.1 Build 20260127 Rel.32017

SG2210MP

4.2x

4.20.18 Build 20260121 Rel.53429

SG2210MP

5.2x

5.20.1 Build 20260127 Rel.32017

SG2210MP

5.x

5.0.15 Build 20260121 Rel.53429

SG2210P

5.3x

5.30.1 Build 20260127 Rel.32017

SG2210P

5.2x

5.20.18 Build 20260121 Rel.53429

SG2210XMP‑M2

1.x

1.0.19 Build 20260121 Rel.53314

SG2218

1.2x

1.20.17 Build 20260121 Rel.53429

SG2218

1.3x

1.30.1 Build 20260127 Rel.32017

SG2218P

1.2x

1.20.17 Build 20260121 Rel.53429

SG2218P

2.2x

2.20.2 Build 20260127 Rel.32017

SG2218P

2.x

2.0.14 Build 20260121 Rel.53429

SG2428LP

1.x

1.0.15 Build 20260121 Rel.53429

SG2428P

5.2x

5.20.20 Build 20260121 Rel.53429

SG2428P

5.3x

5.30.16 Build 20260121 Rel.53429

SG2452LP

1.x

1.0.13 Build 20260121 Rel.54132

SG3210

3.2x

3.20.17 Build 20260121 Rel.53429

SG3210

3.3x

3.30.1 Build 20260206 Rel.33103

SG3210XHP‑M2

3.x

3.0.21 Build 20260121 Rel.53314

SG3210X‑M2

1.2x

1.20.1 Build 20260129 Rel.13605

SG3218XP‑M2

1.x

1.0.19 Build 20260121 Rel.53314

SG3428

2.3x

2.30.16 Build 20260113 Rel.67732

SG3428

2.4x

2.40.1 Build 20260127 Rel.39545

SG3428MP

6.2x

6.20.20 Build 20260113 Rel.67732

SG3428MP

6.3x

6.30.1 Build 20260127 Rel.39545

SG3428X

1.3x

1.30.17 Build 20260113 Rel.67732

SG3428X

1.4x

1.40.1 Build 20260127 Rel.39545

SG3428XF

1.2x

1.20.16 Build 20260113 Rel.67732

SG3428XF

1.3x

1.30.1 Build 20260127 Rel.39545

SG3428X‑M2

1.2x

1.20.18 Build 20260121 Rel.54271

SG3428XMP

3.2x

3.20.21 Build 20260113 Rel.67732

SG3428XMP

3.3x

3.30.1 Build 20260127 Rel.39545

SG3428XMPP

1.2x

1.20.1 Build 20260127 Rel.39545

SG3428XMPP

1.x

1.0.16 Build 20260113 Rel.67732

SG3428XPP‑M2

1.2x

1.20.19 Build 20260121 Rel.54271

SG3452

1.2x

1.20.17 Build 20260121 Rel.54132

SG3452

1.3x

1.30.1 Build 20260128 Rel.7041

SG3452P

3.3x

3.30.17 Build 20260121 Rel.54132

SG3452P

3.4x

3.40.1 Build 20260128 Rel.7041

SG3452X

1.2x

1.20.18 Build 20260121 Rel.55833

SG3452X

1.3x

1.30.1 Build 20260128 Rel.8721

SG3452XMPP

1.x

1.0.15 Build 20260121 Rel.55833

SG3452XP

2.2x

2.20.20 Build 20260121 Rel.55833

SG3452XP

2.3x

2.30.1 Build 20260128 Rel.8721

SL2428P

6.2x

6.20.18 Build 20260121 Rel.53429

SX3008F

1.2x

1.20.12 Build 20251031

SX3016F

1.2x

1.20.16 Build 20260121 Rel.57953

SX3016F

1.3x

1.30.1 Build 20260129 Rel.8831

SX3032F

1.x

1.0.15 Build 20260121 Rel.56907

SX3206HPP

1.2

1.20.12 Build 20251031

SX3832

1.x

1.0.12 Build 20260121 Rel.56907

SX3832MPP

1.x

1.0.11 Build 20260121 Rel.56907

TL-SG2428P

4.x

4.0.26 Build 20260121 Rel.53429

TL‑SG3428MP

5.x

5.0.25 Build 20260113 Rel.67732

TL‑SG3452P

3.0

3.0.22 Build 20260121 Rel.54132

Recommendations:

We strongly recommend that users with affected devices update to the latest available firmware version.

Users in Standalone mode can update firmware through the device’s local web interface.
Users in Controller mode (Omada Controller or Omada app) will be notified of available updates automatically and can apply them directly through the controller.

Alternatively, firmware can also be downloaded on the Omada website:

US: https://support.omadanetworks.com/us/download/firmware/

EN: https://support.omadanetworks.com/en/download/firmware/

AU: https://support.omadanetworks.com/au/download/firmware/

Disclaimer:

If you do not take all recommended actions, this vulnerability will remain. TP-Link cannot bear any responsibility for consequences that could have been avoided by following this advisory.

Please Rate this Document