CVE-2022-37255

TP-Link Tapo C310 1.3.0 devices allow access to the RTSP video feed via credentials of User --- and Password TPL075526460603.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c310_firmware:1.3.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c310:-:*:*:*:*:*:*:*

History

21 Apr 2023, 03:44

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Tp-link
Tp-link tapo C310 Firmware
Tp-link tapo C310
CPE cpe:2.3:h:tp-link:tapo_c310:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tapo_c310_firmware:1.3.0:*:*:*:*:*:*:*
CWE CWE-798
References (MISC) http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html - (MISC) http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html - Exploit, Third Party Advisory, VDB Entry
References (MISC) https://www.tp-link.com/ - (MISC) https://www.tp-link.com/ - Product

16 Apr 2023, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-16 02:15

Updated : 2023-12-10 15:01


NVD link : CVE-2022-37255

Mitre link : CVE-2022-37255

CVE.ORG link : CVE-2022-37255


JSON object : View

Products Affected

tp-link

  • tapo_c310
  • tapo_c310_firmware
CWE
CWE-798

Use of Hard-coded Credentials