Access Control Flaw in TP-Link Tapo C200 V1 Devices
CVE-2022-41505
6.4MEDIUM
Summary
An identified access control issue in TP-Link Tapo C200 V1 devices allows unauthorized individuals in close proximity to take advantage of a weakness in the system. By connecting to the UART pins and interrupting the boot process, attackers can achieve root access by executing commands with init=/bin/sh. This flaw underscores the importance of physical security measures and highlights potential risks associated with unprotected hardware interfaces.
References
CVSS V3.1
Score:
6.4
Severity:
MEDIUM
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Physical
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved