Loading HuntDB...

GHSA-835r-f6jf-2vw3

GitHub Security Advisory

⚠ Unreviewed HIGH Has CVE

Advisory Details

TP-Link Tapo C210 Password Recovery Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link Tapo C210 IP cameras. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the password recovery mechanism. The issue results from reliance upon the secrecy of the password derivation algorithm when generating a recovery password. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-20484.

Related CVEs

Key Information

GHSA ID
GHSA-835r-f6jf-2vw3
Published
May 3, 2024 3:30 AM
Last Modified
May 3, 2024 3:30 AM
CVSS Score
7.5 /10
Primary Ecosystem
Unknown
Primary Package
Unknown
GitHub Reviewed
✗ No

Dataset

Last updated: July 5, 2025 6:26 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.