Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-4045— TP-LINK Tapo C200 remote code execution vulnerability

CVSS 9.8 · Critical EPSS 91.01% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-4045

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
TP-LINK Tapo C200 remote code execution vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Tp-link Tapo C200 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Tp-link Tapo C200是中国普联(Tp-link)公司的一款网络摄像头设备。 Tp-link Tapo C200 网络摄像头 1.1.15及其之前的固件版本存在安全漏洞,该漏洞源于软件中存在默认以root身份运行的uhttpd二进制文件,该文件缺少对于命令参数的过滤和转义。未经身份验证的攻击者可以通过特殊的命令请求利用该漏洞在系统上执行系统命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
TP-LinkTapo C200 1.15 ~ 1.15 -

II. Public POCs for CVE-2021-4045

#POC DescriptionSource LinkShenlong Link
1Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camerahttps://github.com/hacefresko/CVE-2021-4045-PoCPOC Details
2TP-Link Tapo c200 ver <1.1.15 - Remote Code Execution (RCE)https://github.com/onebytex/CVE-2021-4045POC Details
3🔐 "PWNTAPO: Unveiling Command Injection in TP-Link Tapo C200 Cameras (<= v1.1.16 Build 211209)" 🔓https://github.com/B3nj4h/CVE-2021-4045POC Details
4🔐 "PWNTAPO: Unveiling Command Injection in TP-Link Tapo C200 Cameras (<= v1.1.16 Build 211209)" 🔓https://github.com/pl4int3xt/CVE-2021-4045POC Details
5TP-Link Tapo c200 ver <1.1.15 - Remote Code Execution (RCE)https://github.com/jeffbezosispogg/CVE-2021-4045POC Details
6Exploit for command injection vulnerability found in uhttpd binary from TP-Link Tapo c200 IP camerahttps://github.com/hacefresko/CVE-2021-4045POC Details
7🔐 "PWNTAPO: Unveiling Command Injection in TP-Link Tapo C200 Cameras (<= v1.1.16 Build 211209)" 🔓https://github.com/0xbinder/CVE-2021-4045POC Details
8Sets up a local Tapo C200 using CVE-2021-4045https://github.com/DorskFR/tapodatePOC Details
9CVE-2021-4045 CVE-2021-4045 is a Command Injection vulnerability that allows Remote Code Execution in the TP-Link Tapo c200 IP camera. It affects all firmware versions prior to 1.1.16 Build 211209 Rel. 37726N due to insufficient checks on user input in uhttpd, which is one of the main binaries of the device.https://github.com/234329a423853/CVE-2021-4045POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-4045

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-4045

No comments yet


Leave a comment