Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
tp-link tapo vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2023-38906
An issue in TPLink Smart Bulb Tapo series L530 1.1.9, L510E 1.0.8, L630 1.0.3, P100 1.4.9, Smart Camera Tapo series C200 1.1.18, and Tapo Application 2.8.14 allows a remote malicious user to obtain sensitive information via the authentication code for the UDP message.
Tp-link Tapo 2.8.14
Tp-link Tapo L530e Firmware 1.0.0
NA
CVE-2023-27126
The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi password and the TP-LINK account c...
Tp-link Tapo C200 Firmware 1.2.2
NA
CVE-2022-37255
TP-Link Tapo C310 1.3.0 devices allow access to the RTSP video feed via credentials of User --- and Password TPL075526460603.
Tp-link Tapo C310 Firmware 1.3.0
NA
CVE-2022-41505
An access control issue on TP-LInk Tapo C200 V1 devices allows physically proximate malicious users to obtain root access by connecting to the UART pins, interrupting the boot process, and setting an init=/bin/sh value.
Tp-link Tapo C200 V1 Firmware -
10
CVSSv2
CVE-2021-4045
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an malicious user to take full control of the camera.
Tp-link Tapo C200 Firmware
15 Github repositories
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2