CVE-2026-1668

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to execute commands remotely or crash the affected switches by sending specially crafted requests over the network. An attacker needs to have network access to the web interface and does not need to be authenticated to exploit this flaw.

Technical Description

The web interface on multiple Omada switches does not adequately validate certain external inputs, which may lead to out-of-bound memory access when processing crafted requests. Under specific conditions, this flaw may result in unintended command execution.<br>An unauthenticated attacker with network access to the affected interface may cause memory corruption, service instability, or information disclosure. Successful exploitation may allow remote code execution or denial-of-service.

CVSS Vector Analysis

Attack VectorAdjacent Network
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,474($1K-$5K)
Vendor Response
Grade APatched in 2 days

Quick Information

Published

Mar 13, 2026

25 days ago

Last Modified

Mar 16, 2026

23 days ago