First published: Thu May 03 2018(Updated: )
The web management interface in the TP-Link EAP Controller and Omada Controller versions 2.5.4_Windows/2.6.0_Windows does not have Anti-CSRF tokens in any forms. This would allow an attacker to submit authenticated requests when an authenticated user browses an attack-controlled domain. This is fixed in version 2.6.1_Windows.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link EAP Controller | =2.5.4 | |
TP-Link EAP Controller | =2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10166 has a medium severity level due to the lack of Anti-CSRF tokens that enables potential authenticated request submission by attackers.
To fix CVE-2018-10166, update to the latest version of the TP-Link EAP Controller that addresses this vulnerability.
The affected products include TP-Link EAP Controller versions 2.5.4 and 2.6.0 for Windows.
CVE-2018-10166 enables Cross-Site Request Forgery (CSRF) attacks targeting authenticated users.
If using an affected version, you should upgrade to the patched version of the TP-Link EAP Controller as soon as possible.