This vulnerability exists in TP-Link Tapo H200 V1 IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device.
History

Wed, 09 Apr 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Apr 2025 07:15:00 +0000

Type Values Removed Values Added
Description This vulnerability exists in TP-Link Tapo H200 V1 IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device.
Title Information Disclosure Vulnerability in TP-Link Tapo IoT Smart Hub
Weaknesses CWE-312
References
Metrics cvssV4_0

{'score': 4.4, 'vector': 'CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: CERT-In

Published:

Updated: 2025-04-11T05:33:25.874Z

Reserved: 2025-04-08T04:36:57.952Z

Link: CVE-2025-3442

cve-icon Vulnrichment

Updated: 2025-04-09T18:37:57.288Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-09T07:15:41.210

Modified: 2025-04-09T20:02:41.860

Link: CVE-2025-3442

cve-icon Redhat

No data.