The attacker may obtain root access by connecting to the UART port and this vulnerability requires the attacker to have the physical access to the device.
This issue affects Tapo D230S1 V1.20: before 1.2.2 Build 20250907.
This issue affects Tapo D230S1 V1.20: before 1.2.2 Build 20250907.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://www.tp-link.com/en/support/faq/4693/ |
![]() |
History
Tue, 30 Sep 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The attacker may obtain root access by connecting to the UART port and this vulnerability requires the attacker to have the physical access to the device. This issue affects Tapo D230S1 V1.20: before 1.2.2 Build 20250907. | |
Title | Root Access via UART | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2025-09-30T00:08:25.968Z
Reserved: 2025-09-25T17:49:41.909Z
Link: CVE-2025-10991

No data.

No data.

No data.

No data.