First published: Wed Jan 29 2020(Updated: )
A Security Bypass vulnerability exists in TP-LINK IP Cameras TL-SC 3130, TL-SC 3130G, 3171G, 4171G, and 3130 1.6.18P12 due to default hard-coded credentials for the administrative Web interface, which could let a malicious user obtain unauthorized access to CGI files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link TL-SC3130G Firmware | <=1.6.18p12 | |
TP-Link TL-SC3130G Firmware | ||
TP-Link TL-SC3130G Firmware | <=1.6.18p12 | |
TP-Link TL-SC3130G | ||
TP-Link TL-SC 3171G Firmware | <=1.6.18p12 | |
TP-Link TL-SC3171G | ||
TP-Link TL-SC4171G Firmware | <=1.6.18p12 | |
TP-Link TL-SC4171G Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security bypass vulnerability is CVE-2013-2572.
TP-LINK IP Cameras TL-SC 3130, TL-SC 3130G, 3171G, and 4171G are affected by this vulnerability.
The severity rating of CVE-2013-2572 is high, with a severity value of 7.5.
This vulnerability occurs due to default hard-coded credentials for the administrative Web interface.
The risk of this vulnerability is that a malicious user could obtain unauthorized access to CGI files.