NA

CVE-2023-34829

Published: 28/12/2023 Updated: 05/01/2024
CVSS v3 Base Score: 6.5 | Impact Score: 3.6 | Exploitability Score: 2.8
VMScore: 0

Vulnerability Summary

Incorrect access control in TP-Link Tapo before v3.1.315 allows malicious users to access user credentials in plaintext.

Vulnerable Product Search on Vulmon Subscribe to Product

tp-link tapo

Github Repositories

Deceiving the Tapo app by impersonating a TP-Link device

TP-Link_Tapo_Hack Deceiving the Tapo app by impersonating a TP-Link device CVE-ID CVE-2023-34829 Authors Vincenzo De Angelis (vincenzodeangelis@unicalit), assistant professor at the University of Calabria & Sara Lazzaro (saralazzaro@unircit), researcher at the University of Reggio Calabria Objective Bypassing the authentication mechanism of the TP-Link Tapo app to