CVE-2025-14553

Exposure of password hashes through an unauthenticated API response in TP-Link Tapo app on iOS and Android for Tapo cameras, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged.
CVSS

No CVSS.

Configurations

No configuration.

History

09 Jan 2026, 01:15

Type Values Removed Values Added
Summary (en) Exposure of password hashes through an unauthenticated API response in TP-Link Tapo C210 V.1.8 app on iOS and Android, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged. (en) Exposure of password hashes through an unauthenticated API response in TP-Link Tapo app on iOS and Android for Tapo cameras, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged.

16 Dec 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-16 19:15

Updated : 2026-01-09 01:15


NVD link : CVE-2025-14553

Mitre link : CVE-2025-14553

CVE.ORG link : CVE-2025-14553


JSON object : View

Products Affected

No product.

CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor