CVE-2023-35717

TP-Link Tapo C210 Password Recovery Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of TP-Link Tapo C210 IP cameras. Authentication is not required to exploit this vulnerability. The specific flaw exists within the password recovery mechanism. The issue results from reliance upon the secrecy of the password derivation algorithm when generating a recovery password. An attacker can leverage this vulnerability to bypass authentication on the system. . Was ZDI-CAN-20484.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c210_firmware:1.3.0:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c210:v2:*:*:*:*:*:*:*

History

12 Aug 2025, 16:36

Type Values Removed Values Added
References () https://www.zerodayinitiative.com/advisories/ZDI-23-895/ - () https://www.zerodayinitiative.com/advisories/ZDI-23-895/ - Third Party Advisory
CPE cpe:2.3:h:tp-link:tapo_c210:v2:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tapo_c210_firmware:1.3.0:*:*:*:*:*:*:*
First Time Tp-link tapo C210 Firmware
Tp-link
Tp-link tapo C210

Information

Published : 2024-05-03 02:15

Updated : 2025-08-12 16:36


NVD link : CVE-2023-35717

Mitre link : CVE-2023-35717

CVE.ORG link : CVE-2023-35717


JSON object : View

Products Affected

tp-link

  • tapo_c210
  • tapo_c210_firmware
CWE
CWE-640

Weak Password Recovery Mechanism for Forgotten Password