The attacker may obtain root access by connecting to the UART port and this vulnerability requires the attacker to have the physical access to the device.
This issue affects Tapo D230S1 V1.20: before 1.2.2 Build 20250907.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://www.tp-link.com/en/support/faq/4693/ |
![]() ![]() |
History
Tue, 30 Sep 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-306 | |
Metrics |
ssvc
|
Tue, 30 Sep 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Tp-link
Tp-link tapo Tp-link tapo D230s1 Tp-link tp-link |
|
Vendors & Products |
Tp-link
Tp-link tapo Tp-link tapo D230s1 Tp-link tp-link |
Tue, 30 Sep 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The attacker may obtain root access by connecting to the UART port and this vulnerability requires the attacker to have the physical access to the device. This issue affects Tapo D230S1 V1.20: before 1.2.2 Build 20250907. | |
Title | Root Access via UART | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2025-09-30T13:40:21.308Z
Reserved: 2025-09-25T17:49:41.909Z
Link: CVE-2025-10991

Updated: 2025-09-30T13:40:08.325Z

Status : Awaiting Analysis
Published: 2025-09-30T11:37:38.757
Modified: 2025-10-02T19:12:42.843
Link: CVE-2025-10991

No data.

Updated: 2025-09-30T08:47:18Z