Having skimmed through the paper, the lack of coordination between 802.11, L2 switching, and L3 routing is indeed alarming. But I think this one takes the cake:
In the RADIUS protocol, the client is the AP and the server is the remote authentication server, and they pre-share a passphrase. This passphrase is used to encrypt and authenticate RADIUS packet fields, such as to encrypt PMK in transit and derive the Message Authenticator, a hash for integrity-protection. We verified that an attacker, having intercepted the first RADIUS packet sent from the enterprise AP, can brute-force the Message Authenticator and learn the AP passphrase.
If only the first packet between the AP and real RADIUS server is necessary to bypass the encryption between those two and compute the message authentication hash, then the encryption is hideously broken. That is to say, the encryption is not protecting anything and that alone sets a false expectation, even when the first packet can't be intercepted.
That aaid, the manner of this interception of uplink-bound traffic is really sad: what sort of routing config would allow going downstream for the RADIUS serve? Something would have to be deeply wrong with how the control plane is configured, but I do concede that there are plausible networks that do this.