CVE-2021-44032

TP-Link Omada SDN Software Controller before 5.0.15 does not check if the authentication method specified in a connection request is allowed. An attacker can bypass the captive portal authentication process by using the downgraded "no authentication" method, and access the protected network. For example, the attacker can simply set window.authType=0 in client-side JavaScript.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tp-link:omada_software_controller:*:*:*:*:*:windows:*:*

History

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-287 NVD-CWE-Other

15 Mar 2022, 13:25

Type Values Removed Values Added
CWE CWE-287
CPE cpe:2.3:a:tp-link:omada_software_controller:*:*:*:*:*:windows:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
References (MISC) https://www.tp-link.com/us/omada-sdn/ - (MISC) https://www.tp-link.com/us/omada-sdn/ - Vendor Advisory
References (MISC) https://www.tp-link.com/us/security - (MISC) https://www.tp-link.com/us/security - Vendor Advisory
References (MISC) https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_CVE-2021-44032_Kevin.md - (MISC) https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_CVE-2021-44032_Kevin.md - Exploit, Third Party Advisory

10 Mar 2022, 17:54

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-10 17:44

Updated : 2024-02-04 22:29


NVD link : CVE-2021-44032

Mitre link : CVE-2021-44032

CVE.ORG link : CVE-2021-44032


JSON object : View

Products Affected

tp-link

  • omada_software_controller