The attacker may obtain root access by connecting to the UART port and this vulnerability requires the attacker to have the physical access to the device. This issue affects Tapo D230S1 V1.20: before 1.2.2 Build 20250907.
History

Tue, 30 Sep 2025 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-306
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Tp-link
Tp-link tapo
Tp-link tapo D230s1
Tp-link tp-link
Vendors & Products Tp-link
Tp-link tapo
Tp-link tapo D230s1
Tp-link tp-link

Tue, 30 Sep 2025 00:15:00 +0000

Type Values Removed Values Added
Description The attacker may obtain root access by connecting to the UART port and this vulnerability requires the attacker to have the physical access to the device. This issue affects Tapo D230S1 V1.20: before 1.2.2 Build 20250907.
Title Root Access via UART
References
Metrics cvssV4_0

{'score': 7, 'vector': 'CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: TPLink

Published:

Updated: 2025-09-30T13:40:21.308Z

Reserved: 2025-09-25T17:49:41.909Z

Link: CVE-2025-10991

cve-icon Vulnrichment

Updated: 2025-09-30T13:40:08.325Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-30T11:37:38.757

Modified: 2025-10-02T19:12:42.843

Link: CVE-2025-10991

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-30T08:47:18Z