Incorrect access control in TP-Link Tapo before v3.1.315 allows attackers to access user credentials in plaintext.
References
Link | Resource |
---|---|
https://github.com/SecureScripts/TP-Link_Tapo_Hack | Exploit Third Party Advisory |
https://github.com/SecureScripts/TP-Link_Tapo_Hack | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 08:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/SecureScripts/TP-Link_Tapo_Hack - Exploit, Third Party Advisory |
05 Jan 2024, 16:25
Type | Values Removed | Values Added |
---|---|---|
First Time |
Tp-link tapo
Tp-link |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
CPE | cpe:2.3:a:tp-link:tapo:*:*:*:*:*:*:*:* | |
References | () https://github.com/SecureScripts/TP-Link_Tapo_Hack - Exploit, Third Party Advisory | |
CWE | CWE-319 |
28 Dec 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-12-28 03:15
Updated : 2024-11-21 08:07
NVD link : CVE-2023-34829
Mitre link : CVE-2023-34829
CVE.ORG link : CVE-2023-34829
JSON object : View
Products Affected
tp-link
- tapo
CWE
CWE-319
Cleartext Transmission of Sensitive Information