First published: Mon Mar 07 2022(Updated: )
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.
Credit: cve-coordination@incibe.es
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tapo C200 Firmware | <=1.1.15 | |
TP-Link Tapo C200 |
This vulnerability has already been solved by TP-Link in Tapo C200 1.1.16 version.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for TP-Link Tapo C200 IP camera is CVE-2021-4045.
The severity of CVE-2021-4045 is critical with a CVSS score of 9.8.
CVE-2021-4045 allows an attacker to exploit an unauthenticated RCE vulnerability in TP-Link Tapo C200 IP camera, potentially gaining full control of the camera.
TP-Link Tapo C200 IP camera firmware versions up to 1.1.15 are affected by CVE-2021-4045.
To fix CVE-2021-4045 vulnerability, update the firmware of TP-Link Tapo C200 IP camera to a version higher than 1.1.15.