CVE Vulnerabilities

CVE-2021-44032

Published: Mar 10, 2022 | Modified: Jul 12, 2022
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
Ubuntu

TP-Link Omada SDN Software Controller before 5.0.15 does not check if the authentication method specified in a connection request is allowed. An attacker can bypass the captive portal authentication process by using the downgraded no authentication method, and access the protected network. For example, the attacker can simply set window.authType=0 in client-side JavaScript.

Affected Software

Name Vendor Start Version End Version
Omada_software_controller Tp-link * 5.0.15 (excluding)

References