CVE-2026-21635

An Improper Access Control could allow a malicious actor in Wi-Fi range to the EV Station Lite (v1.5.2 and earlier) to use WiFi AutoLink feature on a device that was only adopted via Ethernet.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:ui:unifi_connect_ev_station_lite_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:ui:unifi_connect_ev_station_lite:-:*:*:*:*:*:*:*

History

30 Jan 2026, 01:22

Type Values Removed Values Added
References () https://community.ui.com/releases/Security-Advisory-Bulletin-059/0c0b7f7a-68b7-41b9-987e-554f4b40e0e6 - () https://community.ui.com/releases/Security-Advisory-Bulletin-059/0c0b7f7a-68b7-41b9-987e-554f4b40e0e6 - Vendor Advisory
CPE cpe:2.3:h:ui:unifi_connect_ev_station_lite:-:*:*:*:*:*:*:*
cpe:2.3:o:ui:unifi_connect_ev_station_lite_firmware:*:*:*:*:*:*:*:*
First Time Ui
Ui unifi Connect Ev Station Lite Firmware
Ui unifi Connect Ev Station Lite

07 Jan 2026, 16:15

Type Values Removed Values Added
CWE CWE-284

05 Jan 2026, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-05 17:15

Updated : 2026-01-30 01:22


NVD link : CVE-2026-21635

Mitre link : CVE-2026-21635

CVE.ORG link : CVE-2026-21635


JSON object : View

Products Affected

ui

  • unifi_connect_ev_station_lite_firmware
  • unifi_connect_ev_station_lite
CWE
CWE-284

Improper Access Control