TP-Link Omada SDN Software Controller before 5.0.15 does not check if the authentication method specified in a connection request is allowed. An attacker can bypass the captive portal authentication process by using the downgraded "no authentication" method, and access the protected network. For example, the attacker can simply set window.authType=0 in client-side JavaScript.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2022-03-07T04:06:52
Updated: 2024-08-04T04:10:17.195Z
Reserved: 2021-11-19T00:00:00
Link: CVE-2021-44032
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-03-10T17:44:13.273
Modified: 2024-11-21T06:30:15.490
Link: CVE-2021-44032
Redhat
No data.