TP-Link cloud cameras through 2020-02-09 allow remote attackers to bypass authentication and obtain sensitive information via vectors involving a Wi-Fi session with GPS enabled, aka CNVD-2020-04855.
2020-04-01T04:15:13.630
2024-11-21T04:57:55.907
Modified
CVSSv3.1: 5.3 (MEDIUM)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | tp-link | nc450_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | nc450 | - | No |
Operating System | tp-link | nc260_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | nc260 | - | No |
Operating System | tp-link | nc250_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | nc250 | - | No |
Operating System | tp-link | nc230_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | nc230 | - | No |
Operating System | tp-link | nc220_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | nc220 | - | No |
Operating System | tp-link | nc210_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | nc210 | - | No |
Operating System | tp-link | nc200_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | nc200 | - | No |
Operating System | tp-link | kc300s2_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | kc300s2 | - | No |
Operating System | tp-link | kc310s2_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | kc310s2 | - | No |
Operating System | tp-link | kc200_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | kc200 | - | No |
Operating System | tp-link | tapo_c200_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | tapo_c200 | - | No |
Operating System | tp-link | tapo_c100_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | tapo_c100 | - | No |
Operating System | tp-link | tl-sc3430_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | tl-sc3430 | - | No |
Operating System | tp-link | tl-sc3430n_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | tl-sc3430n | - | No |
Operating System | tp-link | tl-sc4171g_firmware | ≤ 2020-02-09 | Yes |
Hardware | tp-link | tl-sc4171g | - | No |