Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-10428 | This vulnerability exists in TP-Link Tapo H200 V1 IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device. |
Solution
Upgrade TP-Link Tapo H200 V1 IoT Smart Hub to firmware version 1.5.0 or higher http://download.tplinkcloud.com/firmware/H200-up-ver1-5-0-P1[20250221-rel59821]-signed_1740997558340... http://download.tplinkcloud.com/firmware/H200-up-ver1-5-0-P1[20250221-rel59821]-signed_1740997558340.bin
Workaround
No workaround given by the vendor.
Wed, 09 Apr 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 09 Apr 2025 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | This vulnerability exists in TP-Link Tapo H200 V1 IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device. | |
| Title | Information Disclosure Vulnerability in TP-Link Tapo IoT Smart Hub | |
| Weaknesses | CWE-312 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2025-04-11T05:33:25.874Z
Reserved: 2025-04-08T04:36:57.952Z
Link: CVE-2025-3442
Updated: 2025-04-09T18:37:57.288Z
Status : Awaiting Analysis
Published: 2025-04-09T07:15:41.210
Modified: 2025-04-09T20:02:41.860
Link: CVE-2025-3442
No data.
OpenCVE Enrichment
No data.
EUVD