Description
Exposure of password hashes through an unauthenticated API response in TP-Link Tapo C210 V.1.8 app on iOS and Android, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged.
Problem types
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor
Product status
Any version before 3.1.6
Any version before 3.1.601
Credits
Juraj Nyíri
References
apps.apple.com/us/app/tp-link-tapo/id1472718009
play.google.com/store/apps/details?id=com.tplink.iot
www.tp-link.com/us/support/faq/4840/
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.