An Improper Certificate Validation vulnerability in TP-Link Tapo H100 v1 and Tapo P100 v1 allows an on-path attacker on the same network segment to intercept and modify encrypted device-cloud communications. This may compromise the confidentiality and integrity of device-to-cloud communication, enabling manipulation of device data or operations.
References
| Link | Resource |
|---|---|
| https://www.tp-link.com/en/support/download/tapo-h100/ | Product |
| https://www.tp-link.com/en/support/download/tapo-p100/ | Product |
| https://www.tp-link.com/us/support/download/tapo-h100/ | Product |
| https://www.tp-link.com/us/support/download/tapo-p100/ | Product |
| https://www.tp-link.com/us/support/faq/4949/ | Vendor Advisory |
Configurations
History
12 Feb 2026, 17:29
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Tp-link
Tp-link tapo P100 Firmware Tp-link tapo P100 Tp-link tapo H100 Tp-link tapo H100 Firmware |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| References | () https://www.tp-link.com/en/support/download/tapo-h100/ - Product | |
| References | () https://www.tp-link.com/en/support/download/tapo-p100/ - Product | |
| References | () https://www.tp-link.com/us/support/download/tapo-h100/ - Product | |
| References | () https://www.tp-link.com/us/support/download/tapo-p100/ - Product | |
| References | () https://www.tp-link.com/us/support/faq/4949/ - Vendor Advisory | |
| CPE | cpe:2.3:h:tp-link:tapo_h100:1.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_p100_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tapo_p100:1.0:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_h100_firmware:*:*:*:*:*:*:*:* |
05 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-05 18:16
Updated : 2026-02-12 17:29
NVD link : CVE-2025-15557
Mitre link : CVE-2025-15557
CVE.ORG link : CVE-2025-15557
JSON object : View
Products Affected
tp-link
- tapo_p100_firmware
- tapo_h100_firmware
- tapo_h100
- tapo_p100
CWE
CWE-295
Improper Certificate Validation
