Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14553: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in TP-Link Systems Inc. Tapo C210

0
High
VulnerabilityCVE-2025-14553cvecve-2025-14553cwe-200
Published: Tue Dec 16 2025 (12/16/2025, 18:38:08 UTC)
Source: CVE Database V5
Vendor/Project: TP-Link Systems Inc.
Product: Tapo C210

Description

Exposure of password hashes through an unauthenticated API response in TP-Link Tapo C210 V.1.8 app on iOS and Android, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged.

AI-Powered Analysis

AILast updated: 12/16/2025, 19:09:45 UTC

Technical Analysis

CVE-2025-14553 is a vulnerability identified in the TP-Link Tapo C210 smart camera system, specifically affecting the mobile application versions on iOS and Android platforms. The vulnerability arises from an unauthenticated API endpoint that inadvertently exposes password hashes to any actor on the local network. This exposure violates CWE-200, which concerns the exposure of sensitive information to unauthorized actors. Attackers connected to the same local network as the device can query this API to retrieve password hashes without needing any credentials or user interaction. Once obtained, these hashes can be subjected to brute force attacks offline to recover the actual passwords, potentially granting full control over the device. The vulnerability does not affect the device firmware itself, meaning the attack vector is limited to the mobile application layer. The CVSS 4.0 vector indicates the attack requires local network access (AV:A), has low attack complexity (AC:L), does not require privileges or user interaction, but impacts confidentiality heavily (VC:H). No known exploits have been reported in the wild as of the publication date. The issue can be mitigated by updating the mobile application to a patched version that removes or secures the vulnerable API endpoint. Since the firmware remains unchanged, organizations must ensure mobile app updates are enforced to close this attack vector. This vulnerability is critical for environments relying on Tapo C210 cameras for security or monitoring, as unauthorized access could lead to privacy breaches or manipulation of device functions.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the confidentiality and integrity of surveillance data collected by Tapo C210 cameras. Unauthorized access to password hashes and subsequent brute forcing could allow attackers to gain control over the cameras, leading to potential espionage, privacy violations, or disruption of security monitoring. Organizations in sectors such as critical infrastructure, government, healthcare, and corporate environments that deploy these cameras for security purposes are particularly at risk. The requirement for local network access somewhat limits the attack surface but does not eliminate risk, especially in environments with less segmented or poorly secured internal networks. The absence of firmware fixes means that mobile app update compliance is the sole mitigation path, which may be challenging in large or distributed organizations. Failure to patch could result in data leakage, unauthorized surveillance, or manipulation of security systems, undermining trust and potentially violating data protection regulations such as GDPR.

Mitigation Recommendations

1. Enforce immediate updates of the TP-Link Tapo mobile application on all iOS and Android devices used to manage Tapo C210 cameras to the latest patched version that addresses this vulnerability. 2. Implement network segmentation to isolate IoT devices like Tapo cameras from critical internal networks, reducing the risk of local network attacks. 3. Monitor local network traffic for unusual API calls or repeated authentication attempts that may indicate brute force activities targeting the cameras. 4. Educate users and administrators about the importance of updating mobile applications promptly and the risks of using outdated versions. 5. Employ strong, complex passwords for device access to increase the difficulty of brute force attacks on exposed hashes. 6. Consider deploying network access controls such as NAC solutions to restrict which devices can connect to the local network where cameras reside. 7. Regularly audit IoT device configurations and access logs to detect unauthorized access attempts early. 8. Engage with TP-Link support channels to stay informed about any future firmware updates or additional security advisories.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
TPLink
Date Reserved
2025-12-11T22:58:26.015Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6941ae5b0d5f6f4391b0c38b

Added to database: 12/16/2025, 7:09:15 PM

Last enriched: 12/16/2025, 7:09:45 PM

Last updated: 12/18/2025, 3:37:44 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats