SHADOW - Wrong Key

I have a Shadow that’s factory reset and updated to 3.216.

On the Internet tab, I choose Repeater, find my wireless network (Unifi ACPro), enter the correct password, I get a “wrong key” on timeout.

Sun May 14 00:02:42 2023 user.info : [ 1754] gl-wifi-core>> Restart wifi...
Sun May 14 00:02:43 2023 daemon.notice hostapd: wlan0: interface state ENABLED->DISABLED
Sun May 14 00:02:43 2023 daemon.notice hostapd: wlan0: AP-DISABLED
Sun May 14 00:02:43 2023 daemon.notice hostapd: wlan0: CTRL-EVENT-TERMINATING
Sun May 14 00:02:43 2023 daemon.err wpa_supplicant[20820]:  Failed to stop hostapd AP interfaces
Sun May 14 00:02:43 2023 daemon.notice wpa_supplicant[20820]: nl80211: deinit ifname=wlan-sta disabled_11b_rates=0
Sun May 14 00:02:43 2023 daemon.notice hostapd: nl80211: deinit ifname=wlan0 disabled_11b_rates=0
Sun May 14 00:02:43 2023 daemon.notice wpa_supplicant[20820]: wlan-sta: CTRL-EVENT-TERMINATING
Sun May 14 00:02:43 2023 kern.info kernel: [  857.672650] device wlan0 left promiscuous mode
Sun May 14 00:02:43 2023 kern.info kernel: [  857.677362] br-lan: port 2(wlan0) entered disabled state
Sun May 14 00:02:43 2023 daemon.notice netifd: Interface 'wwan' is disabled
Sun May 14 00:02:45 2023 daemon.err hostapd: Configuration file: /var/run/hostapd-phy0.conf
Sun May 14 00:02:45 2023 daemon.notice netifd: radio0 (21420): sh: /usr/bin/ovs-vsctl: not found
Sun May 14 00:02:45 2023 daemon.notice netifd: radio0 (21420): sh: /usr/bin/ovs-vsctl: not found
Sun May 14 00:02:45 2023 kern.info kernel: [  859.984000] br-lan: port 2(wlan0) entered blocking state
Sun May 14 00:02:45 2023 kern.info kernel: [  859.989502] br-lan: port 2(wlan0) entered disabled state
Sun May 14 00:02:45 2023 kern.info kernel: [  859.995381] device wlan0 entered promiscuous mode
Sun May 14 00:02:45 2023 daemon.err hostapd: Using interface wlan0 with hwaddr 96:83:c4:17:54:18 and ssid "GL-AR300M-418-NOR"
Sun May 14 00:02:45 2023 daemon.notice hostapd: wlan0: interface state UNINITIALIZED->ENABLED
Sun May 14 00:02:45 2023 daemon.notice hostapd: wlan0: AP-ENABLED
Sun May 14 00:02:46 2023 daemon.notice wpa_supplicant[21684]: Successfully initialized wpa_supplicant
Sun May 14 00:02:46 2023 daemon.notice netifd: Interface 'wwan' is enabled
Sun May 14 00:02:47 2023 daemon.notice wpa_supplicant[21690]: wlan-sta: SME: Trying to authenticate with 82:2a:a8:1a:da:52 (SSID='TEPO' freq=2437 MHz)
Sun May 14 00:02:47 2023 kern.info kernel: [  861.831939] wlan-sta: authenticate with 82:2a:a8:1a:da:52
Sun May 14 00:02:47 2023 kern.info kernel: [  861.851157] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 1/3)
Sun May 14 00:02:47 2023 kern.info kernel: [  861.981093] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 2/3)
Sun May 14 00:02:47 2023 kern.info kernel: [  862.121101] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 3/3)
Sun May 14 00:02:47 2023 kern.info kernel: [  862.251077] wlan-sta: authentication with 82:2a:a8:1a:da:52 timed out
Sun May 14 00:02:50 2023 daemon.notice wpa_supplicant[21690]: wlan-sta: SME: Trying to authenticate with 82:2a:a8:1a:da:52 (SSID='TEPO' freq=2437 MHz)
Sun May 14 00:02:50 2023 kern.info kernel: [  864.371297] wlan-sta: authenticate with 82:2a:a8:1a:da:52
Sun May 14 00:02:50 2023 kern.info kernel: [  864.390407] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 1/3)
Sun May 14 00:02:50 2023 kern.info kernel: [  864.501024] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 2/3)
Sun May 14 00:02:50 2023 kern.info kernel: [  864.671055] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 3/3)
Sun May 14 00:02:50 2023 kern.info kernel: [  864.781015] wlan-sta: authentication with 82:2a:a8:1a:da:52 timed out
Sun May 14 00:02:53 2023 daemon.notice wpa_supplicant[21690]: wlan-sta: SME: Trying to authenticate with 82:2a:a8:1a:da:52 (SSID='TEPO' freq=2437 MHz)
Sun May 14 00:02:53 2023 kern.info kernel: [  867.781338] wlan-sta: authenticate with 82:2a:a8:1a:da:52
Sun May 14 00:02:53 2023 kern.info kernel: [  867.800583] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 1/3)
Sun May 14 00:02:53 2023 kern.info kernel: [  867.941193] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 2/3)
Sun May 14 00:02:53 2023 kern.info kernel: [  868.061167] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 3/3)
Sun May 14 00:02:53 2023 kern.info kernel: [  868.181160] wlan-sta: authentication with 82:2a:a8:1a:da:52 timed out
Sun May 14 00:02:53 2023 daemon.notice wpa_supplicant[21690]: wlan-sta: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="TEPO" auth_failures=1 duration=10 reason=CONN_FAILED
Sun May 14 00:03:03 2023 daemon.notice wpa_supplicant[21690]: wlan-sta: CTRL-EVENT-SSID-REENABLED id=0 ssid="TEPO"
Sun May 14 00:03:05 2023 daemon.notice wpa_supplicant[21690]: wlan-sta: SME: Trying to authenticate with 82:2a:a8:1a:da:52 (SSID='TEPO' freq=2437 MHz)
Sun May 14 00:03:05 2023 kern.info kernel: [  880.191377] wlan-sta: authenticate with 82:2a:a8:1a:da:52
Sun May 14 00:03:05 2023 kern.info kernel: [  880.210486] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 1/3)
Sun May 14 00:03:06 2023 kern.info kernel: [  880.421188] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 2/3)
Sun May 14 00:03:06 2023 kern.info kernel: [  880.531218] wlan-sta: send auth to 82:2a:a8:1a:da:52 (try 3/3)
Sun May 14 00:03:06 2023 kern.info kernel: [  880.641196] wlan-sta: authentication with 82:2a:a8:1a:da:52 timed out
Sun May 14 00:03:06 2023 daemon.notice wpa_supplicant[21690]: wlan-sta: CTRL-EVENT-SSID-TEMP-DISABLED id=0 ssid="TEPO" auth_failures=2 duration=20 reason=CONN_FAILED

Any suggestions?

Are there any special characters in your password?
You can try changing your password or encryption method.

The password is 8 characters that are all letters over WPA2

Whether there are characters such as @, #, etc., although they are allowed in wpa2, the program execution may be problematic.

Just 8 letters: eyeplace

can you check on your unifi if there is settings “band steering”? If yes turn it off.