First published: Tue Aug 22 2023(Updated: )
An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the TSKEP authentication function.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tp-link Tapo | =2.8.14 | |
Tp-link Tapo L530e Firmware | =1.0.0 | |
Tp-link Tapo L530e | ||
All of | ||
Any of | ||
Tp-link Tapo | =2.8.14 | |
Tp-link Tapo L530e Firmware | =1.0.0 | |
Tp-link Tapo L530e |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38908 is a vulnerability found in TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 that allows a remote attacker to obtain sensitive information through the TSKEP authentication function.
CVE-2023-38908 has a severity value of 6.5, which is considered medium.
TPLink Smart bulb Tapo series L530 v.1.0.0 and Tapo Application v.2.8.14 are affected by CVE-2023-38908.
An attacker can exploit CVE-2023-38908 by leveraging the TSKEP authentication function to obtain sensitive information remotely.
Currently, there is no information available about a fix for CVE-2023-38908. It is recommended to follow the vendor's security advisories for updates.