A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication. An attacker in a privileged network position may be able to intercept or modify traffic if they can position themselves within the communication channel. Successful exploitation may compromise confidentiality, integrity, and availability of application data.
History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link aginet
Tp-link deco
Tp-link festa
Tp-link kasa
Tp-link omada
Tp-link tapo
Tp-link tether
Tp-link tp-partner
Tp-link tpcamera
Tp-link vigi
CPEs cpe:2.3:a:tp-link:aginet:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:deco:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:festa:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:kasa:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:kidshield:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:omada:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:omada_guard:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tapo:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tether:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tp-partner:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:tpcamera:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:vigi:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:wi-fi_navi:*:*:*:*:*:*:*:*
cpe:2.3:a:tp-link:wifi_toolkit:*:*:*:*:*:*:*:*
Vendors & Products Tp-link aginet
Tp-link deco
Tp-link festa
Tp-link kasa
Tp-link omada
Tp-link tapo
Tp-link tether
Tp-link tp-partner
Tp-link tpcamera
Tp-link vigi
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Fri, 13 Feb 2026 22:30:00 +0000

Type Values Removed Values Added
References

Fri, 13 Feb 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link aginet App
Tp-link deco App
Tp-link festa App
Tp-link kasa App
Tp-link kidshield
Tp-link omada Guard
Tp-link tapo App
Tp-link tether App
Tp-link tp-partner App
Tp-link tpcamera App
Tp-link vigi App
Tp-link wi-fi Navi
Tp-link wifi Toolkit
Tp Link
Tp Link omada App
Vendors & Products Tp-link
Tp-link aginet App
Tp-link deco App
Tp-link festa App
Tp-link kasa App
Tp-link kidshield
Tp-link omada Guard
Tp-link tapo App
Tp-link tether App
Tp-link tp-partner App
Tp-link tpcamera App
Tp-link vigi App
Tp-link wi-fi Navi
Tp-link wifi Toolkit
Tp Link
Tp Link omada App

Fri, 13 Feb 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 13 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A vulnerability in the certificate validation logic may allow applications to accept untrusted or improperly validated server identities during TLS communication. An attacker in a privileged network position may be able to intercept or modify traffic if they can position themselves within the communication channel. Successful exploitation may compromise confidentiality, integrity, and availability of application data.
Title Insufficient Certificate Validation in Multiple Mobile Applications Allows Man in the Middle Interception
Weaknesses CWE-295
References
Metrics cvssV4_0

{'score': 7.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2026-02-13T22:10:15.723Z

Reserved: 2025-08-20T22:29:42.732Z

Link: CVE-2025-9293

cve-icon Vulnrichment

Updated: 2026-02-13T13:17:16.362Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-13T02:16:46.523

Modified: 2026-04-01T20:49:52.653

Link: CVE-2025-9293

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-13T21:28:52Z