TP-Link Omada SDN Software Controller before 5.0.15 does...
High severity
Unreviewed
Published
Mar 11, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Description
Published by the National Vulnerability Database
Mar 10, 2022
Published to the GitHub Advisory Database
Mar 11, 2022
Last updated
Jan 27, 2023
TP-Link Omada SDN Software Controller before 5.0.15 does not check if the authentication method specified in a connection request is allowed. An attacker can bypass the captive portal authentication process by using the downgraded "no authentication" method, and access the protected network. For example, the attacker can simply set window.authType=0 in client-side JavaScript.
References