Логотип exploitDog
bind:CVE-2025-1099
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-1099

Количество 3

Количество 3

nvd логотип

CVE-2025-1099

12 месяцев назад

This vulnerability exists in Tapo C500 Wi-Fi camera due to hard-coded RSA private key embedded within the device firmware. An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device.

EPSS: Низкий
github логотип

GHSA-xhcv-4cg2-46v5

12 месяцев назад

The TP-Link Tapo C500 V1 and V2 are a pan-and-tilt outdoor Wi-Fi security cameras designed for comprehensive surveillance. This vulnerability exists in Tapo C500 Wi-Fi camera due to hard-coded RSA private key embedded within the device firmware. An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device.

EPSS: Низкий
fstec логотип

BDU:2025-02734

около 1 года назад

Уязвимость микропрограммного обеспечения Wi-Fi камер TP-Link Tapo C500, связанная с использованием жестко закодированного криптографического ключа, позволяющая нарушителю выполнить атаку типа «человек посередине»

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-1099

This vulnerability exists in Tapo C500 Wi-Fi camera due to hard-coded RSA private key embedded within the device firmware. An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device.

0%
Низкий
12 месяцев назад
github логотип
GHSA-xhcv-4cg2-46v5

The TP-Link Tapo C500 V1 and V2 are a pan-and-tilt outdoor Wi-Fi security cameras designed for comprehensive surveillance. This vulnerability exists in Tapo C500 Wi-Fi camera due to hard-coded RSA private key embedded within the device firmware. An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device.

0%
Низкий
12 месяцев назад
fstec логотип
BDU:2025-02734

Уязвимость микропрограммного обеспечения Wi-Fi камер TP-Link Tapo C500, связанная с использованием жестко закодированного криптографического ключа, позволяющая нарушителю выполнить атаку типа «человек посередине»

CVSS3: 6.8
0%
Низкий
около 1 года назад

Уязвимостей на страницу