TP-Link Omada SDN Software Controller before 5.0.15 does not check if the authentication method specified in a connection request is allowed. An attacker can bypass the captive portal authentication process by using the downgraded "no authentication" method, and access the protected network. For example, the attacker can simply set window.authType=0 in client-side JavaScript.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T04:10:17.195Z
Reserved: 2021-11-19T00:00:00
Link: CVE-2021-44032

No data.

Status : Modified
Published: 2022-03-10T17:44:13.273
Modified: 2024-11-21T06:30:15.490
Link: CVE-2021-44032

No data.