Exposure of password hashes through an unauthenticated API response in TP-Link Tapo app on iOS and Android for Tapo cameras, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged.
CVSS
No CVSS.
References
Configurations
No configuration.
History
09 Jan 2026, 01:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) Exposure of password hashes through an unauthenticated API response in TP-Link Tapo app on iOS and Android for Tapo cameras, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged. |
16 Dec 2025, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-16 19:15
Updated : 2026-01-09 01:15
NVD link : CVE-2025-14553
Mitre link : CVE-2025-14553
CVE.ORG link : CVE-2025-14553
JSON object : View
Products Affected
No product.
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
