First published: Mon Jan 23 2023(Updated: )
An access control issue on TP-LInk Tapo C200 V1 devices allows physically proximate attackers to obtain root access by connecting to the UART pins, interrupting the boot process, and setting an init=/bin/sh value.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tapo C200 V1 Firmware | ||
TP-LInk Tapo C200 V1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-41505 is classified as a high-severity vulnerability due to the ability for attackers to gain root access.
To mitigate CVE-2022-41505, ensure that physical access to the device is restricted and apply any firmware updates provided by TP-Link.
CVE-2022-41505 specifically affects TP-Link Tapo C200 V1 devices.
CVE-2022-41505 is an access control vulnerability that allows attackers to manipulate device settings directly.
No, CVE-2022-41505 requires physical proximity to the device for exploitation.