First published: Mon Feb 10 2025(Updated: )
This vulnerability exists in Tapo C500 Wi-Fi camera due to hard-coded RSA private key embedded within the device firmware. An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device.
Credit: vdisclose@cert-in.org.in
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Tapo C500 |
Upgrade TP-Link Tapo C500 V1 to version 1.3.2 https://download.tplinkcloud.com/firmware/Tapo_C500v1_en_1.3.2_Build_250108_Rel.40063n_up_boot-signe... https://download.tplinkcloud.com/firmware/Tapo_C500v1_en_1.3.2_Build_250108_Rel.40063n_up_boot-signed_1737345124385.bin Upgrade TP-Link Tapo C500 V2 to version 1.0.6 http://download.tplinkcloud.com/firmware/Tapo_C500v1_en_1.3.2_Build_250108_Rel.40063n_up_boot-signed... http://download.tplinkcloud.com/firmware/Tapo_C500v1_en_1.3.2_Build_250108_Rel.40063n_up_boot-signed_1737345124385.bin
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-1099 is considered high due to the exploitation of a hard-coded RSA private key in the TP-Link Tapo C500 camera.
To fix CVE-2025-1099, users should update the firmware of the TP-Link Tapo C500 camera to the latest version provided by the manufacturer.
The risks associated with CVE-2025-1099 include unauthorized access to the camera's features and potentially compromising the security and privacy of the surveillance footage.
CVE-2025-1099 affects users of the TP-Link Tapo C500 V1 and V2 Wi-Fi security cameras.
Yes, physical access to the device is required to exploit CVE-2025-1099 due to the nature of the hard-coded RSA private key.