An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function.
References
Link | Resource |
---|---|
https://arxiv.org/abs/2308.09019 | Third Party Advisory |
https://arxiv.org/pdf/2308.09019.pdf | Exploit Technical Description Third Party Advisory |
https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ | |
https://www.scitepress.org/Papers/2023/120929/120929.pdf | |
https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 | Third Party Advisory |
https://arxiv.org/abs/2308.09019 | Third Party Advisory |
https://arxiv.org/pdf/2308.09019.pdf | Exploit Technical Description Third Party Advisory |
https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ | |
https://www.scitepress.org/Papers/2023/120929/120929.pdf | |
https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:14
Type | Values Removed | Values Added |
---|---|---|
References | () https://arxiv.org/abs/2308.09019 - Third Party Advisory | |
References | () https://arxiv.org/pdf/2308.09019.pdf - Exploit, Technical Description, Third Party Advisory | |
References | () https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ - | |
References | () https://www.scitepress.org/Papers/2023/120929/120929.pdf - | |
References | () https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 - Third Party Advisory |
07 May 2024, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Summary | (en) An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function. |
19 Jan 2024, 20:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
25 Aug 2023, 17:48
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | (MISC) https://arxiv.org/abs/2308.09019 - Third Party Advisory | |
References | (MISC) https://arxiv.org/pdf/2308.09019.pdf - Exploit, Technical Description, Third Party Advisory | |
References | (MISC) https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 - Third Party Advisory | |
CWE | NVD-CWE-noinfo | |
First Time |
Tp-link tapo L530e
Tp-link Tp-link tapo Tp-link tapo L530e Firmware |
|
CPE | cpe:2.3:h:tp-link:tapo_l530e:-:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_l530e_firmware:1.0.0:*:*:*:*:*:*:* cpe:2.3:a:tp-link:tapo:2.8.14:*:*:*:*:*:*:* |
22 Aug 2023, 12:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-22 01:15
Updated : 2024-11-21 08:14
NVD link : CVE-2023-38909
Mitre link : CVE-2023-38909
CVE.ORG link : CVE-2023-38909
JSON object : View
Products Affected
tp-link
- tapo_l530e_firmware
- tapo_l530e
- tapo
CWE