Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 12 Feb 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link tapo H100 Firmware
Tp-link tapo P100 Tp-link tapo P100 Firmware |
|
| CPEs | cpe:2.3:h:tp-link:tapo_h100:1.0:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tapo_p100:1.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_h100_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_p100_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Tp-link tapo H100 Firmware
Tp-link tapo P100 Tp-link tapo P100 Firmware |
|
| Metrics |
cvssV3_1
|
Fri, 06 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tp-link
Tp-link tapo H100 |
|
| Vendors & Products |
Tp-link
Tp-link tapo H100 |
Thu, 05 Feb 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 05 Feb 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An Improper Certificate Validation vulnerability in TP-Link Tapo H100 v1 and Tapo P100 v1 allows an on-path attacker on the same network segment to intercept and modify encrypted device-cloud communications. This may compromise the confidentiality and integrity of device-to-cloud communication, enabling manipulation of device data or operations. | |
| Title | Improper Certificate Validation in TP-Link Tapo H100 and P100 Allows Man-in-the-Middle Attack | |
| Weaknesses | CWE-295 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2026-02-05T20:33:53.106Z
Reserved: 2026-02-03T19:41:36.223Z
Link: CVE-2025-15557
Updated: 2026-02-05T20:33:42.437Z
Status : Analyzed
Published: 2026-02-05T18:16:09.750
Modified: 2026-02-12T17:29:30.100
Link: CVE-2025-15557
No data.
OpenCVE Enrichment
Updated: 2026-02-06T12:05:06Z