Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-29236 | TP-Link Tether versions prior to 4.5.13 and TP-Link Tapo versions prior to 3.3.6 do not properly validate certificates, which may allow a remote unauthenticated attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack. |
Fri, 28 Mar 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-295 | |
| Metrics |
ssvc
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-03-28T19:23:24.162Z
Reserved: 2024-04-01T00:10:49.414Z
Link: CVE-2024-31340
Updated: 2024-08-02T01:52:56.541Z
Status : Deferred
Published: 2024-05-22T06:15:12.350
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-31340
No data.
OpenCVE Enrichment
No data.
EUVD