An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function.
References
Link | Resource |
---|---|
https://arxiv.org/abs/2308.09019 | Third Party Advisory |
https://arxiv.org/pdf/2308.09019.pdf | Exploit Technical Description Third Party Advisory |
https://www.dmi.unict.it/giamp/smartbulbscanbehackedtohackintoyourhousehold/ | |
https://www.scitepress.org/Papers/2023/120929/120929.pdf | |
https://www.scitepress.org/PublicationsDetail.aspx?ID=X/auBv7JrSo=&t=1 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-08-22 01:15
Updated : 2024-05-07 15:15
NVD link : CVE-2023-38909
Mitre link : CVE-2023-38909
CVE.ORG link : CVE-2023-38909
JSON object : View
Products Affected
tp-link
- tapo_l530e
- tapo
- tapo_l530e_firmware
CWE