Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-30910 | The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi password and the TP-LINK account credential of the victim. |
Wed, 08 Jan 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-01-08T15:47:38.197Z
Reserved: 2023-02-27T00:00:00.000Z
Link: CVE-2023-27126
Updated: 2024-08-02T12:01:32.381Z
Status : Modified
Published: 2023-06-06T18:15:10.343
Modified: 2025-01-08T16:15:27.993
Link: CVE-2023-27126
No data.
OpenCVE Enrichment
No data.
EUVD