Remote Code Execution Vulnerability in Omada Switches - Omada Networks
CVE-2026-1668

7.7HIGH

Key Information:

Vendor
CVE Published:
13 March 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-1668?

The web interface of multiple Omada switches lacks proper validation for certain external inputs, potentially allowing out-of-bounds memory access when processing specially crafted requests. This flaw creates an opportunity for an unauthenticated attacker with network access to exploit the affected interface, possibly leading to memory corruption, system instability, or information leakage. Successful exploitation may result in the execution of arbitrary commands or a denial-of-service condition, highlighting the need for immediate attention and patching.

Affected Version(s)

SG2005P-PD 1.x SG2005P-PD(UN) 1.0 0 < 1.0.19 Build 20260121 Rel.53429

SG2008 4.2x SG2008(UN) 4.20 0 < 4.20.17 Build 20260121 Rel.53429

SG2008 4.3x SG2008(UN) 4.30 0 < 4.30.1 Build 20260127 Rel.32017

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

tangrs
.