CVE-2025-14300
HIGH
8,7
Source: f23511db-6c3e-4e32-a477-6aa17d310630
Attack Vector: adjacent
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH
8,1
Source: [email protected]
Attack Vector: adjacent_network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: high
Availability: high
Description
AI Translation Available
The HTTPS service on Tapo C200 V3 exposes a connectAP interface without proper authentication. An unauthenticated attacker on the same local network segment can exploit this to modify the device’s Wi-Fi configuration, resulting in loss of connectivity and denial-of-service (DoS).
EPSS (Exploit Prediction Scoring System)
Trend Analysis
EPSS (Exploit Prediction Scoring System)
Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.
EPSS Score
0,0008
Percentile
0,2th
Updated
EPSS Score Trend (Last 87 Days)
306
Missing Authentication for Critical Function
DraftCommon Consequences
Security Scopes Affected:
Access Control
Other
Potential Impacts:
Gain Privileges Or Assume Identity
Varies By Context
Applicable Platforms
Technologies:
Cloud Computing, ICS/OT
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.14:build_240513:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.4:build_230424:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.7:build_230920:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.4.2:build_250313:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.11:build_231115:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.5:build_230717:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.15:build_240715:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.4.1:build_241212:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.3:build_230228:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.13:build_240327:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.4.4:build_250922:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Operating System
Tapo C200 Firmware by Tp-Link
CPE Identifier
View Detailed Analysis
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.9:build_231019:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://www.tp-link.com/us/support/download/tapo-c200/v3/#Firmware-Release-Notes
https://www.tp-link.com/us/support/faq/4849/