CVE-2023-35717
8.8HIGHTP-Link Tapo C210 Password Recovery Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link Tapo C210 IP
Опубликовано: 5/3/2024Обновлено: 8/12/2025
Описание
TP-Link Tapo C210 Password Recovery Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link Tapo C210 IP cameras. Authentication is not required to exploit this vulnerability. The specific flaw exists within the password recovery mechanism. The issue results from reliance upon the secrecy of the password derivation algorithm when generating a recovery password. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-20484.
ИИ-АнализНа базе ИИ
Затронутые продукты
tp-linktapo_c210_firmware
1.3.0
tp-linktapo_c210
v2
Ссылки
- https://www.zerodayinitiative.com/advisories/ZDI-23-895/Third Party Advisory
- https://www.zerodayinitiative.com/advisories/ZDI-23-895/Third Party Advisory