First published: Wed Jul 05 2023(Updated: )
This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link Tapo C210 IP cameras. Authentication is not required to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
TP-Link Tapo C210 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-23-895 is considered high due to the ability for unauthenticated network-adjacent attackers to exploit the vulnerability.
To fix ZDI-23-895, users should update their TP-Link Tapo C210 cameras to the latest firmware provided by TP-Link.
ZDI-23-895 specifically affects users of the TP-Link Tapo C210 IP cameras that have not applied the latest security updates.
ZDI-23-895 is an authentication bypass vulnerability that allows attackers to access the camera without proper authentication.
No, ZDI-23-895 requires network adjacency, meaning the attacker must be on the same local network to exploit the vulnerability.