CVE-2022-37255

TP-Link Tapo C310 1.3.0 devices allow access to the RTSP video feed via credentials of User --- and Password TPL075526460603.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c310_firmware:1.3.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c310:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:14

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html - Exploit, Third Party Advisory, VDB Entry
References () https://www.tp-link.com/ - Product () https://www.tp-link.com/ - Product

21 Apr 2023, 03:44

Type Values Removed Values Added
First Time Tp-link
Tp-link tapo C310
Tp-link tapo C310 Firmware
CWE CWE-798
References (MISC) https://www.tp-link.com/ - (MISC) https://www.tp-link.com/ - Product
References (MISC) http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html - (MISC) http://packetstormsecurity.com/files/171540/Tapo-C310-RTSP-Server-1.3.0-Unauthorized-Video-Stream-Access.html - Exploit, Third Party Advisory, VDB Entry
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:h:tp-link:tapo_c310:-:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tapo_c310_firmware:1.3.0:*:*:*:*:*:*:*

16 Apr 2023, 02:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-04-16 02:15

Updated : 2025-02-06 19:15


NVD link : CVE-2022-37255

Mitre link : CVE-2022-37255

CVE.ORG link : CVE-2022-37255


JSON object : View

Products Affected

tp-link

  • tapo_c310
  • tapo_c310_firmware
CWE
CWE-798

Use of Hard-coded Credentials