Show filters
102 Total Results
Displaying 1-10 of 102
Sort by:
Attacker Value
Unknown

CVE-2025-1099

Disclosure Date: February 10, 2025 (last updated February 14, 2025)
This vulnerability exists in Tapo C500 Wi-Fi camera due to hard-coded RSA private key embedded within the device firmware. An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device.
0
Attacker Value
Unknown

CVE-2024-10523

Disclosure Date: November 04, 2024 (last updated November 09, 2024)
This vulnerability exists in TP-Link IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device.
Attacker Value
Unknown

CVE-2024-31340

Disclosure Date: May 22, 2024 (last updated May 22, 2024)
TP-Link Tether versions prior to 4.5.13 and TP-Link Tapo versions prior to 3.3.6 do not properly validate certificates, which may allow a remote unauthenticated attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack.
0
Attacker Value
Unknown

CVE-2023-41184

Disclosure Date: May 03, 2024 (last updated September 18, 2024)
TP-Link Tapo C210 ActiveCells Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Tapo C210 IP cameras. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the ActiveCells parameter of the CreateRules and ModifyRules APIs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. . Was ZDI-CAN-20589.
0
Attacker Value
Unknown

CVE-2023-35717

Disclosure Date: May 03, 2024 (last updated September 18, 2024)
TP-Link Tapo C210 Password Recovery Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link Tapo C210 IP cameras. Authentication is not required to exploit this vulnerability. The specific flaw exists within the password recovery mechanism. The issue results from reliance upon the secrecy of the password derivation algorithm when generating a recovery password. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-20484.
0
Attacker Value
Unknown

CVE-2023-49515

Disclosure Date: January 17, 2024 (last updated January 25, 2024)
Insecure Permissiosn vulnerability in TP Link TC70 and C200 WIFI Camera v.3 firmware v.1.3.4 and fixed in v.1.3.11 allows a physically proximate attacker to obtain sensitive information via a connection to the UART pin components.
Attacker Value
Unknown

CVE-2023-27098

Disclosure Date: January 09, 2024 (last updated January 13, 2024)
TP-Link Tapo APK up to v2.12.703 uses hardcoded credentials for access to the login panel.
Attacker Value
Unknown

CVE-2023-34829

Disclosure Date: December 28, 2023 (last updated January 06, 2024)
Incorrect access control in TP-Link Tapo before v3.1.315 allows attackers to access user credentials in plaintext.
Attacker Value
Unknown

CVE-2023-39610

Disclosure Date: October 31, 2023 (last updated November 09, 2023)
An issue in TP-Link Tapo C100 v1.1.15 Build 211130 Rel.15378n(4555) and before allows attackers to cause a Denial of Service (DoS) via supplying a crafted web request.
Attacker Value
Unknown

CVE-2023-38907

Disclosure Date: September 25, 2023 (last updated May 07, 2024)
An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key.