Vulnerability and Impact Description:
CVE-2026-1668:
The web interface does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests. Under specific conditions, this flaw may result in unintended command execution.
An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure. Successful exploitation may allow remote code execution or denial-of-service.
CVSS v4.0 Score: 7.7 / High
CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Affected Products/Versions and Fixes:
|
Affected Models |
Hardware Branch |
Fixed Version |
|
SG2005P‑PD |
1.x |
1.0.19 Build 20260121 Rel.53429 |
|
SG2008 |
4.2x |
4.20.17 Build 20260121 Rel.53429 |
|
SG2008 |
4.3x |
4.30.1 Build 20260127 Rel.32017 |
|
SG2008P |
3.2x |
3.20.17 Build 20260121 Rel.53429 |
|
SG2008P |
3.3x |
3.30.1 Build 20260127 Rel.32017 |
|
SG2016P |
1.2x |
1.20.17 Build 20260121 Rel.53429 |
|
SG2016P |
1.3x |
1.30.1 Build 20260127 Rel.32017 |
|
SG2210MP |
4.2x |
4.20.18 Build 20260121 Rel.53429 |
|
SG2210MP |
5.2x |
5.20.1 Build 20260127 Rel.32017 |
|
SG2210MP |
5.x |
5.0.15 Build 20260121 Rel.53429 |
|
SG2210P |
5.3x |
5.30.1 Build 20260127 Rel.32017 |
|
SG2210P |
5.2x |
5.20.18 Build 20260121 Rel.53429 |
|
SG2210XMP‑M2 |
1.x |
1.0.19 Build 20260121 Rel.53314 |
|
SG2218 |
1.2x |
1.20.17 Build 20260121 Rel.53429 |
|
SG2218 |
1.3x |
1.30.1 Build 20260127 Rel.32017 |
|
SG2218P |
1.2x |
1.20.17 Build 20260121 Rel.53429 |
|
SG2218P |
2.2x |
2.20.2 Build 20260127 Rel.32017 |
|
SG2218P |
2.x |
2.0.14 Build 20260121 Rel.53429 |
|
SG2428LP |
1.x |
1.0.15 Build 20260121 Rel.53429 |
|
SG2428P |
5.2x |
5.20.20 Build 20260121 Rel.53429 |
|
SG2428P |
5.3x |
5.30.16 Build 20260121 Rel.53429 |
|
SG2452LP |
1.x |
1.0.13 Build 20260121 Rel.54132 |
|
SG3210 |
3.2x |
3.20.17 Build 20260121 Rel.53429 |
|
SG3210 |
3.3x |
3.30.1 Build 20260206 Rel.33103 |
|
SG3210XHP‑M2 |
3.x |
3.0.21 Build 20260121 Rel.53314 |
|
SG3210X‑M2 |
1.2x |
1.20.1 Build 20260129 Rel.13605 |
|
SG3218XP‑M2 |
1.x |
1.0.19 Build 20260121 Rel.53314 |
|
SG3428 |
2.3x |
2.30.16 Build 20260113 Rel.67732 |
|
SG3428 |
2.4x |
2.40.1 Build 20260127 Rel.39545 |
|
SG3428MP |
6.2x |
6.20.20 Build 20260113 Rel.67732 |
|
SG3428MP |
6.3x |
6.30.1 Build 20260127 Rel.39545 |
|
SG3428X |
1.3x |
1.30.17 Build 20260113 Rel.67732 |
|
SG3428X |
1.4x |
1.40.1 Build 20260127 Rel.39545 |
|
SG3428XF |
1.2x |
1.20.16 Build 20260113 Rel.67732 |
|
SG3428XF |
1.3x |
1.30.1 Build 20260127 Rel.39545 |
|
SG3428X‑M2 |
1.2x |
1.20.18 Build 20260121 Rel.54271 |
|
SG3428XMP |
3.2x |
3.20.21 Build 20260113 Rel.67732 |
|
SG3428XMP |
3.3x |
3.30.1 Build 20260127 Rel.39545 |
|
SG3428XMPP |
1.2x |
1.20.1 Build 20260127 Rel.39545 |
|
SG3428XMPP |
1.x |
1.0.16 Build 20260113 Rel.67732 |
|
SG3428XPP‑M2 |
1.2x |
1.20.19 Build 20260121 Rel.54271 |
|
SG3452 |
1.2x |
1.20.17 Build 20260121 Rel.54132 |
|
SG3452 |
1.3x |
1.30.1 Build 20260128 Rel.7041 |
|
SG3452P |
3.3x |
3.30.17 Build 20260121 Rel.54132 |
|
SG3452P |
3.4x |
3.40.1 Build 20260128 Rel.7041 |
|
SG3452X |
1.2x |
1.20.18 Build 20260121 Rel.55833 |
|
SG3452X |
1.3x |
1.30.1 Build 20260128 Rel.8721 |
|
SG3452XMPP |
1.x |
1.0.15 Build 20260121 Rel.55833 |
|
SG3452XP |
2.2x |
2.20.20 Build 20260121 Rel.55833 |
|
SG3452XP |
2.3x |
2.30.1 Build 20260128 Rel.8721 |
|
SL2428P |
6.2x |
6.20.18 Build 20260121 Rel.53429 |
|
SX3008F |
1.2x |
1.20.12 Build 20251031 |
|
SX3016F |
1.2x |
1.20.16 Build 20260121 Rel.57953 |
|
SX3016F |
1.3x |
1.30.1 Build 20260129 Rel.8831 |
|
SX3032F |
1.x |
1.0.15 Build 20260121 Rel.56907 |
|
SX3206HPP |
1.2 |
1.20.12 Build 20251031 |
|
SX3832 |
1.x |
1.0.12 Build 20260121 Rel.56907 |
|
SX3832MPP |
1.x |
1.0.11 Build 20260121 Rel.56907 |
|
TL-SG2428P |
4.x |
4.0.26 Build 20260121 Rel.53429 |
|
TL‑SG3428MP |
5.x |
5.0.25 Build 20260113 Rel.67732 |
|
TL‑SG3452P |
3.0 |
3.0.22 Build 20260121 Rel.54132 |
Recommendations:
We strongly recommend that users with affected devices update to the latest available firmware version.
Users in Standalone mode can update firmware through the device’s local web interface.
Users in Controller mode (Omada Controller or Omada app) will be notified of available updates automatically and can apply them directly through the controller.
Alternatively, firmware can also be downloaded on the Omada website:
US: https://support.omadanetworks.com/us/download/firmware/
EN: https://support.omadanetworks.com/en/download/firmware/
AU: https://support.omadanetworks.com/au/download/firmware/
Disclaimer:
If you do not take all recommended actions, this vulnerability will remain. TP-Link cannot bear any responsibility for consequences that could have been avoided by following this advisory.