We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-3442

Information Disclosure Vulnerability in TP-Link Tapo IoT Smart Hub



Description

This vulnerability exists in TP-Link Tapo H200 V1 IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device.

Reserved 2025-04-08 | Published 2025-04-09 | Updated 2025-04-11 | Assigner CERT-In


MEDIUM: 4.4CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-312: Cleartext Storage of Sensitive Information

Product status

Default status
unaffected

<=1.4.0
affected

Credits

This vulnerability is reported by Shravan Singh, Ganesh Bakare, and Abhinav Giridhar from Mumbai, India. finder

References

www.cert-in.org.in/...eid=PUBVLNOTES01&VLCODE=CIVN-2025-0072 third-party-advisory

cve.org (CVE-2025-3442)

nvd.nist.gov (CVE-2025-3442)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-3442

Support options

Helpdesk Chat, Email, Knowledgebase