First published: Mon Nov 04 2024(Updated: )
This vulnerability exists in TP-Link IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device.
Credit: vdisclose@cert-in.org.in
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Tp-link Tapo H100 Firmware | <1.5.22 | |
TP-Link Tapo H100 | =1.0 |
Upgrade TP-Link Tapo H100 IoT Smart Hub to firmware version 1.5.22
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10523 has a high severity rating due to the potential for credential exposure.
To fix CVE-2024-10523, update the TP-Link Tapo H100 firmware to a version later than 1.5.22.
The risks associated with CVE-2024-10523 include unauthorized access to Wi-Fi networks if an attacker exploits the vulnerability.
CVE-2024-10523 affects users of the TP-Link Tapo H100 IoT Smart Hub running the vulnerable firmware version.
No, CVE-2024-10523 requires physical access to the device for exploitation.