The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi password and the TP-LINK account credential of the victim.
References
Link | Resource |
---|---|
http://tapo.com | Product |
http://tp-link.com | Product |
https://www.claranet.fr/blog/dans-les-entrailles-dune-camera-connectee-tp-link-14 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-06-06 18:15
Updated : 2023-06-12 16:28
NVD link : CVE-2023-27126
Mitre link : CVE-2023-27126
CVE.ORG link : CVE-2023-27126
JSON object : View
Products Affected
tp-link
- tapo_c200
- tapo_c200_firmware
CWE
CWE-522
Insufficiently Protected Credentials