The AES Key-IV pair used by the TP-Link TAPO C200 camera...
Moderate severity
Unreviewed
Published
Jun 6, 2023
to the GitHub Advisory Database
•
Updated Apr 4, 2024
Description
Published by the National Vulnerability Database
Jun 6, 2023
Published to the GitHub Advisory Database
Jun 6, 2023
Last updated
Apr 4, 2024
The AES Key-IV pair used by the TP-Link TAPO C200 camera V3 (EU) on firmware version 1.1.22 Build 220725 is reused across all cameras. An attacker with physical access to a camera is able to extract and decrypt sensitive data containing the Wifi password and the TP-LINK account credential of the victim.
References