First published: Mon Aug 21 2023(Updated: )
An issue in TPLink Smart Bulb Tapo series L530 1.1.9, L510E 1.0.8, L630 1.0.3, P100 1.4.9, Smart Camera Tapo series C200 1.1.18, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the authentication code for the UDP message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Tapo | =2.8.14 | |
TP-Link Tapo L530E | =1.0.0 | |
Tp-link Tapo L530e Firmware | ||
All of | ||
Any of | ||
TP-Link Tapo | =2.8.14 | |
TP-Link Tapo L530E | =1.0.0 | |
Tp-link Tapo L530e Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-38906.
The severity level of CVE-2023-38906 is medium.
CVE-2023-38906 allows a remote attacker to obtain sensitive information via the authentication code for the UDP message.
TPLink Tapo Application v.2.8.14 is affected by CVE-2023-38906.
To fix CVE-2023-38906, it is recommended to update Tapo Application to a version that addresses the vulnerability.