Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 17 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple ios Google android Tp-link Tp-link tapo Tp-link tapo C210 |
|
| Vendors & Products |
Apple
Apple ios Google android Tp-link Tp-link tapo Tp-link tapo C210 |
Tue, 16 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Dec 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exposure of password hashes through an unauthenticated API response in TP-Link Tapo C210 V.1.8 app on iOS and Android, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged. | |
| Title | Password Hash Leak Could Lead to Unauthorized Access on Tapo 210 via Local Network | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2025-12-16T19:10:54.148Z
Reserved: 2025-12-11T22:58:26.015Z
Link: CVE-2025-14553
Updated: 2025-12-16T19:10:04.202Z
Status : Received
Published: 2025-12-16T19:15:54.307
Modified: 2025-12-16T19:15:54.307
Link: CVE-2025-14553
No data.
OpenCVE Enrichment
Updated: 2025-12-17T14:28:48Z