First published: Wed Jan 29 2020(Updated: )
A Security Bypass vulnerability exists in TP-LINK IP Cameras TL-SC 3130, TL-SC 3130G, 3171G, 4171G, and 3130 1.6.18P12 due to default hard-coded credentials for the administrative Web interface, which could let a malicious user obtain unauthorized access to CGI files.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tl-sc 3130 Firmware | <=1.6.18p12 | |
Tp-link Tl-sc 3130 | ||
Tp-link Tl-sc 3130g Firmware | <=1.6.18p12 | |
Tp-link Tl-sc 3130g | ||
Tp-link Tl-sc 3171g Firmware | <=1.6.18p12 | |
Tp-link Tl-sc 3171g | ||
Tp-link Tl-sc 4171g Firmware | <=1.6.18p12 | |
Tp-link Tl-sc 4171g |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security bypass vulnerability is CVE-2013-2572.
TP-LINK IP Cameras TL-SC 3130, TL-SC 3130G, 3171G, and 4171G are affected by this vulnerability.
The severity rating of CVE-2013-2572 is high, with a severity value of 7.5.
This vulnerability occurs due to default hard-coded credentials for the administrative Web interface.
The risk of this vulnerability is that a malicious user could obtain unauthorized access to CGI files.