Description
An Improper Access Control could allow a malicious actor in Wi-Fi range to the EV Station Lite (v1.5.2 and earlier) to use WiFi AutoLink feature on a device that was only adopted via Ethernet.
Published: 2026-01-05
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized access via Wi‑Fi AutoLink on Ethernet‑only adopted devices
Action: Assess Impact
AI Analysis

Impact

An improper access control flaw exists in the UniFi Connect EV Station Lite firmware versions 1.5.2 and earlier. A malicious actor within Wi‑Fi range can activate the device’s Wi‑Fi AutoLink feature against a unit that was previously adopted via Ethernet. Because the AutoLink function is not properly restricted, the attacker could potentially invoke management or configuration operations that should be available only to devices adopted over a wired connection. This weakness is categorized as CWE‑284, reflecting a failure to enforce access control policies.

Affected Systems

The vendor is Ubiquiti Inc, product UniFi Connect EV Station Lite. Firmware versions 1.5.2 and earlier are vulnerable. No additional version or build information is specified beyond the firmware release number. The affected model is identified by the community advisory available at the provided link.

Risk and Exploitability

The CVSS base score is 5.3, indicating moderate severity. The EPSS probability is reported as less than 1 percent, signifying a very low but non‑zero likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers would need local Wi‑Fi access to the device and must trigger the AutoLink feature from a device that was not adopted via Ethernet, implying that exploitation is limited to a local or compromised wireless environment.

Generated by OpenCVE AI on April 18, 2026 at 08:19 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Install the latest firmware version of UniFi Connect EV Station Lite that contains a fix for the improper access control issue.
  • Disable the AutoLink feature for devices that have not been adopted through an Ethernet connection or apply configuration settings that prevent AutoLink requests from unapproved clients.
  • Restrict the EV Station Lite to a secure, authenticated Wi‑Fi network and isolate it from untrusted networks, ensuring that only authorized devices can reach it.

Generated by OpenCVE AI on April 18, 2026 at 08:19 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 08:45:00 +0000

Type Values Removed Values Added
Title Improper Access Control Allowing Wi‑Fi AutoLink on Ethernet‑Only Adopted Devices

Fri, 30 Jan 2026 01:30:00 +0000

Type Values Removed Values Added
First Time appeared Ui
Ui unifi Connect Ev Station Lite
Ui unifi Connect Ev Station Lite Firmware
CPEs cpe:2.3:h:ui:unifi_connect_ev_station_lite:-:*:*:*:*:*:*:*
cpe:2.3:o:ui:unifi_connect_ev_station_lite_firmware:*:*:*:*:*:*:*:*
Vendors & Products Ui
Ui unifi Connect Ev Station Lite
Ui unifi Connect Ev Station Lite Firmware

Wed, 07 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-284

Tue, 06 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Ubiquiti
Ubiquiti ev Station Lite
Vendors & Products Ubiquiti
Ubiquiti ev Station Lite

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description An Improper Access Control could allow a malicious actor in Wi-Fi range to the EV Station Lite (v1.5.2 and earlier) to use WiFi AutoLink feature on a device that was only adopted via Ethernet.
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Ubiquiti Ev Station Lite
Ui Unifi Connect Ev Station Lite Unifi Connect Ev Station Lite Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2026-01-07T15:19:03.376Z

Reserved: 2026-01-01T15:00:02.338Z

Link: CVE-2026-21635

cve-icon Vulnrichment

Updated: 2026-01-05T19:39:40.254Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-05T17:15:47.350

Modified: 2026-01-30T01:22:13.397

Link: CVE-2026-21635

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T08:30:35Z

Weaknesses