CVE Vulnerabilities

CVE-2021-44032

Published: Mar 10, 2022 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

TP-Link Omada SDN Software Controller before 5.0.15 does not check if the authentication method specified in a connection request is allowed. An attacker can bypass the captive portal authentication process by using the downgraded no authentication method, and access the protected network. For example, the attacker can simply set window.authType=0 in client-side JavaScript.

Affected Software

NameVendorStart VersionEnd Version
Omada_software_controllerTp-link*5.0.15 (excluding)

References