Exposure of password hashes through an unauthenticated API response in TP-Link Tapo C210 V.1.8 app on iOS and Android, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged.
Metrics
Affected Vendors & Products
References
History
Wed, 17 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apple
Apple ios Google android Tp-link Tp-link tapo Tp-link tapo C210 |
|
| Vendors & Products |
Apple
Apple ios Google android Tp-link Tp-link tapo Tp-link tapo C210 |
Tue, 16 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 16 Dec 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exposure of password hashes through an unauthenticated API response in TP-Link Tapo C210 V.1.8 app on iOS and Android, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged. | |
| Title | Password Hash Leak Could Lead to Unauthorized Access on Tapo 210 via Local Network | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published: 2025-12-16T18:38:08.805Z
Updated: 2025-12-17T19:42:38.428Z
Reserved: 2025-12-11T22:58:26.015Z
Link: CVE-2025-14553
Updated: 2025-12-16T19:10:04.202Z
Status : Received
Published: 2025-12-16T19:15:54.307
Modified: 2025-12-16T19:15:54.307
Link: CVE-2025-14553
No data.