6 results (0.010 seconds)

CVSS: 4.6EPSS: 0%CPEs: 8EXPL: 2

Insecure Permissiosn vulnerability in TP Link TC70 and C200 WIFI Camera v.3 firmware v.1.3.4 and fixed in v.1.3.11 allows a physically proximate attacker to obtain sensitive information via a connection to the UART pin components. La vulnerabilidad de permisos inseguros en TP Link TC70 y C200 WIFI Camera v.3 firmware v.1.3.4 y corregida en v.1.3.11 permite a un atacante físicamente cercano obtener información confidencial a través de una conexión a los componentes del pin UART. • https://github.com/VineethKumarM/TAPO-TC70-Unauthorized-root-access-using-UART https://github.com/VineethKumarM/TAPO-TC70-Unauthorized-root-access-using-UART/tree/master • CWE-922: Insecure Storage of Sensitive Information •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 1

TP-Link Tapo APK up to v2.12.703 uses hardcoded credentials for access to the login panel. TP-Link Tapo APK hasta v2.12.703 utiliza credenciales codificadas para acceder al panel de inicio de sesión. • http://tp-lin.com http://tp-link.com https://github.com/c0d3x27/CVEs/tree/main/CVE-2023-27098 https://www.tp-link.com/support/contact-technical-support/#LiveChat-Support • CWE-312: Cleartext Storage of Sensitive Information •

CVSS: 4.6EPSS: 0%CPEs: 2EXPL: 1

The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi password and the TP-LINK account credential of the victim. • http://tapo.com http://tp-link.com https://www.claranet.fr/blog/dans-les-entrailles-dune-camera-connectee-tp-link-14 • CWE-522: Insufficiently Protected Credentials •

CVSS: 6.4EPSS: 0%CPEs: 2EXPL: 1

An access control issue on TP-LInk Tapo C200 V1 devices allows physically proximate attackers to obtain root access by connecting to the UART pins, interrupting the boot process, and setting an init=/bin/sh value. • https://github.com/hemant70072/Access-control-issue-in-TP-Link-Tapo-C200-V1. •

CVSS: 10.0EPSS: 21%CPEs: 2EXPL: 5

TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera. La cámara IP TP-Link Tapo C200, en su versión de firmware 1.1.15 y anteriores, está afectada por una vulnerabilidad RCE no autenticada, presente en el binario uhttpd que es ejecutado por fallo como root. La explotación de esta vulnerabilidad permite a un atacante tomar el control total de la cámara TP-Link Tapo c200 version 1.1.15 suffers from a remote code execution vulnerability. • https://www.exploit-db.com/exploits/51017 https://github.com/hacefresko/CVE-2021-4045-PoC https://github.com/pl4int3xt/CVE-2021-4045 https://github.com/jeffbezosispogg/CVE-2021-4045 http://packetstormsecurity.com/files/168472/TP-Link-Tapo-c200-1.1.15-Remote-Code-Execution.html https://www.incibe-cert.es/en/early-warning/security-advisories/tp-link-tapo-c200-remote-code-execution-vulnerability • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •