6 results (0.016 seconds)

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

TP-Link Tapo APK up to v2.12.703 uses hardcoded credentials for access to the login panel. TP-Link Tapo APK hasta v2.12.703 utiliza credenciales codificadas para acceder al panel de inicio de sesión. • http://tp-lin.com http://tp-link.com https://github.com/c0d3x27/CVEs/tree/main/CVE-2023-27098 https://www.tp-link.com/support/contact-technical-support/#LiveChat-Support • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

Incorrect access control in TP-Link Tapo before v3.1.315 allows attackers to access user credentials in plaintext. El control de acceso incorrecto en TP-Link Tapo anterior a v3.1.315 permite a los atacantes acceder a las credenciales de usuario en texto plano. • https://github.com/SecureScripts/TP-Link_Tapo_Hack • CWE-319: Cleartext Transmission of Sensitive Information •

CVSS: 7.5EPSS: 0%CPEs: 3EXPL: 0

An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to replay old messages encrypted with a still valid session key. Un problema en TPLink Smart bulb TPLink Tapo series L530 v.1.0.0 y Tapo Application v.2.8.14 permite a un atacante remoto obtener información sensible a través de la clave de sesión en la función de mensaje. • https://arxiv.org/abs/2308.09019 https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold https://www.scitepress.org/Papers/2023/120929/120929.pdf https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 1

An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function. un problema en TPLink Smart bulb Tapo series L530 v.1.0.0 y Tapo Application v.2.8.14 permite a un atacante remoto obtener información sensible a través del componente IV en la función AES128-CBC. • https://arxiv.org/abs/2308.09019 https://arxiv.org/pdf/2308.09019.pdf https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold https://www.scitepress.org/Papers/2023/120929/120929.pdf https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 •

CVSS: 6.5EPSS: 0%CPEs: 3EXPL: 0

An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the TSKEP authentication function. Un problema en TPLink Smart bulb Tapo series L530 v.1.0.0 y la aplicación Tapo v.2.8.14 permite a un atacante remoto obtener información confidencial a través de la función de autenticación TSKEP. • https://arxiv.org/abs/2308.09019 https://arxiv.org/pdf/2308.09019.pdf https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold https://www.scitepress.org/Papers/2023/120929/120929.pdf https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 •