Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-46549: n/a

0
High
VulnerabilityCVE-2024-46549cvecve-2024-46549
Published: Mon Sep 30 2024 (09/30/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in the TP-Link MQTT Broker and API gateway of TP-Link Kasa KP125M v1.0.3 allows attackers to establish connections by impersonating devices owned by other users.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 08:42:03 UTC

Technical Analysis

CVE-2024-46549 is a vulnerability identified in the TP-Link MQTT Broker and API gateway component of the TP-Link Kasa KP125M smart plug, specifically version 1.0.3. The flaw allows attackers to establish connections by impersonating devices owned by other users, effectively bypassing authentication mechanisms that should restrict device access. This vulnerability falls under CWE-269 (Improper Privilege Management), indicating that the system fails to enforce proper access controls. The attack vector is adjacent network (AV:A), meaning the attacker must be on the same local network or have network access to the device's communication channel. The attack complexity is low (AC:L), requiring no special conditions beyond network access. No privileges are required (PR:N), but user interaction is necessary (UI:R), possibly involving tricking a user into initiating a connection or action. The scope is unchanged (S:U), so the impact is limited to the vulnerable component. The impact on confidentiality and integrity is high (C:H/I:H), as attackers can impersonate devices and potentially intercept or manipulate data. Availability impact is low (A:L), indicating limited disruption to device operation. No patches or exploits are currently reported, but the vulnerability poses a significant risk to environments using these devices. The MQTT protocol is widely used in IoT for device communication, so this vulnerability could enable attackers to control or spoof devices, leading to unauthorized access or data leakage. The lack of authentication enforcement in the API gateway and broker is the root cause, allowing impersonation attacks.

Potential Impact

The vulnerability allows attackers to impersonate legitimate devices on the network, potentially gaining unauthorized access to device functions and data streams. This can lead to unauthorized control of smart plugs, manipulation of device states, and interception or injection of MQTT messages. For organizations, this could mean compromised IoT device integrity, leading to operational disruptions or privacy breaches. In environments where these devices are integrated into larger automation or monitoring systems, attackers could pivot to other network segments or escalate attacks. The confidentiality of user data and device commands is at high risk, as is the integrity of device operations. Although availability impact is low, the trustworthiness of IoT infrastructure is undermined. The requirement for adjacent network access limits remote exploitation but does not eliminate risk, especially in poorly segmented or insecure networks. The absence of known exploits suggests a window for proactive mitigation before widespread attacks occur.

Mitigation Recommendations

1. Network Segmentation: Isolate IoT devices like the TP-Link Kasa KP125M on separate VLANs or subnets with strict access controls to limit attacker proximity. 2. Monitor MQTT Traffic: Deploy network monitoring tools to detect anomalous MQTT connections or device impersonation attempts. 3. Enforce Strong Authentication: Where possible, configure devices and MQTT brokers to require strong authentication and authorization mechanisms. 4. Firmware Updates: Regularly check for and apply vendor firmware updates or patches addressing this vulnerability once released. 5. Disable Unnecessary Services: If the MQTT Broker or API gateway features are not required, disable them to reduce attack surface. 6. User Awareness: Educate users about the risks of interacting with unknown devices or networks to reduce social engineering vectors. 7. Network Access Controls: Implement strict firewall rules to restrict MQTT protocol traffic to trusted devices only. 8. Incident Response: Prepare to isolate affected devices quickly if suspicious activity is detected. These steps go beyond generic advice by focusing on network architecture, monitoring, and proactive device management tailored to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-09-11T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6d02b7ef31ef0b56c3ed

Added to database: 2/25/2026, 9:43:30 PM

Last enriched: 2/26/2026, 8:42:03 AM

Last updated: 4/12/2026, 3:43:37 PM

Views: 26

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses