10
CVSSv2

CVE-2021-4045

Published: 10/03/2022 Updated: 30/09/2022
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 894
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an malicious user to take full control of the camera.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

tp-link tapo_c200_firmware

Exploits

TP-Link Tapo c200 version 1115 suffers from a remote code execution vulnerability ...

Github Repositories

TP-Link Tapo c200 ver <1.1.15 - Remote Code Execution (RCE)

Exploit Title: TP-LINK Tapo c200 1115 - RCE Vendor: wwwtp-linkcom/en/home-networking/cloud-camera/tapo-c200/ Version: 1115 and below CVE: CVE-2021-4045 Loadable C2 botnet &amp; massexploit Write up of vuln: wwwhacefreskocom/posts/tp-link-tapo-c200-unauthenticated-rce

TP-Link Tapo c200 ver <1.1.15 - Remote Code Execution (RCE)

Exploit Title: TP-LINK Tapo c200 1115 - RCE Vendor: wwwtp-linkcom/en/home-networking/cloud-camera/tapo-c200/ Version: 1115 and below CVE: CVE-2021-4045 Loadable C2 botnet &amp; massexploit Write up of vuln: wwwhacefreskocom/posts/tp-link-tapo-c200-unauthenticated-rce

Project for course 521253S at University of Oulu

Computer Security Project - Hacking TP-Link C100 &amp; C200 Project for course 521253S at the University of Oulu Aim: explore hardware hacking try to gain root access to TP-Link C200 and Inteno FG500 dump root filesystem try to find vulnerabilities in the product(s) Group Lassi Heikkilä Y68725369 Mikko Isotalo 2264612 Initial exploration on the C200 First up was the

I leverage OpenAI and ChatGPT to do hackerish things

Test the app live here: hackgptcom Hunt for JIRA issues using type=bug, fix issue and commit fix back to ticket as comment JIRA_hackGPTmp4 Launch hackGPT with python hackGPT_pythonmp4 Added PrettyTable for logging and It will load the chatbot in a new tab of your active broswer hackGPT

BeCode Module - Active Directory Pentesting

bc_ad_lab BeCode Module - Active Directory Pentesting Intro A lab was set up with one machine running a Windows Server with an Active Directory Two other Windows 10 user computers were set up to simulate a working environment A machine running a Debian Server was also set up Goal We assumed the role of the Red Team and were tasked with gaining access to a Domain Admin accou

hacking ai

HackGPT support telegram tme/@onionua HackGPT - мощный и настраиваемый интерфейс AI чат бот, созданный специально для разработчиков, чтобы расширить ваши возможности для взлома и возможностей процесса разработки Интерфейс, пох

🔐 "PWNTAPO: Unveiling Command Injection in TP-Link Tapo C200 Cameras (<= v1.1.16 Build 211209)" 🔓

TP-Link Tapo c200 1115 - Remote Code Execution (RCE) (CVE-2021-4045) 🔐 "PWNTAPO: Unveiling Command Injection in TP-Link Tapo C200 Cameras (&lt;= v1116 Build 211209)" 🔓 Read about the exploit from exploit db This is a command injection vulnerability that affect all TP-Link Tapo c200 camera firmware versions &lt; 1116 Build 211209 Rel 37726N To re

Test the app live here: hackgptcom Hunt for JIRA issues using type=bug, fix issue and commit fix back to ticket as comment JIRA_hackGPTmp4 Launch hackGPT with python hackGPT_pythonmp4 Added PrettyTable for logging and It will load the chatbot in a new tab of your active broswer hackGPT

Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camera

CVE-2021-4045 PoC CVE-2021-4045 is a Command Injection vulnerability that allows Remote Code Execution in the TP-Link Tapo c200 IP camera It affects all firmware versions prior to 1116 Build 211209 Rel 37726N due to insufficient checks on user input in uhttpd, which is one of the main binaries of the device Full write up can be found here Proof of Concept (pwnTapopy) Thi

🤖 hackGPT

Test the app live here: hackgptcom Hunt for JIRA issues using type=bug, fix issue and commit fix back to ticket as comment JIRA_hackGPTmp4 Launch hackGPT with python hackGPT_pythonmp4 Added PrettyTable for logging and It will load the chatbot in a new tab of your active broswer hackGPT

Automated Cataloguing of Starred Repos because Github Search Sucks

Awesome Stars A curated list of my GitHub stars! Generated by juev/starred Contents Assembly Autoit Batchfile Blitzbasic C C# C++ CSS Cmake Crystal Dart Dockerfile Earthly Elm Go HTML Haskell Hcl Holyc Java JavaScript Jinja Jupyter Notebook Kotlin LUA Makefile Markdown Mathematica Mdx Nim Nix Objective-C Others PHP Pascal Perl PowerShell Purescript Python Roff Ruby Rust SC

Test the app live here: hackgptcom Hunt for JIRA issues using type=bug, fix issue and commit fix back to ticket as comment JIRA_hackGPTmp4 Launch hackGPT with python hackGPT_pythonmp4 Added PrettyTable for logging and It will load the chatbot in a new tab of your active broswer hackGPT

The original repo: githubcom/NoDataFound/hackGPT Test the app live here: hackgptcom Hunt for JIRA issues using type=bug, fix issue and commit fix back to ticket as comment JIRA_hackGPTmp4 Launch hackGPT with python hackGPT_pythonmp4 Added PrettyTable for logging and It will load

I leverage OpenAI and ChatGPT to do hackerish things

Test the app live here: hackgptcom Hunt for JIRA issues using type=bug, fix issue and commit fix back to ticket as comment JIRA_hackGPTmp4 Launch hackGPT with python hackGPT_pythonmp4 Added PrettyTable for logging and It will load the chatbot in a new tab of your active broswer hackGPT