Exposure of password hashes through an unauthenticated API response in TP-Link Tapo C210 V.1.8 app on iOS and Android, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged.
Metrics
Affected Vendors & Products
References
History
Tue, 16 Dec 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Exposure of password hashes through an unauthenticated API response in TP-Link Tapo C210 V.1.8 app on iOS and Android, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged. | |
| Title | Password Hash Leak Could Lead to Unauthorized Access on Tapo 210 via Local Network | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: TPLink
Published:
Updated: 2025-12-16T19:10:54.148Z
Reserved: 2025-12-11T22:58:26.015Z
Link: CVE-2025-14553
No data.
Status : Received
Published: 2025-12-16T19:15:54.307
Modified: 2025-12-16T19:15:54.307
Link: CVE-2025-14553
No data.
OpenCVE Enrichment
No data.