A Security Bypass vulnerability exists in TP-LINK IP Cameras TL-SC 3130, TL-SC 3130G, 3171G, 4171G, and 3130 1.6.18P12 due to default hard-coded credentials for the administrative Web interface, which could let a malicious user obtain unauthorized access to CGI files.
References
Link | Resource |
---|---|
http://www.exploit-db.com/exploits/25812 | Exploit Patch Third Party Advisory VDB Entry |
https://www.coresecurity.com/advisories/tp-link-ip-cameras-multiple-vulnerabilities | Exploit Patch Third Party Advisory |
https://packetstormsecurity.com/files/cve/CVE-2013-2572 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/60194 | Third Party Advisory VDB Entry |
https://exchange.xforce.ibmcloud.com/vulnerabilities/84573 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Information
Published : 2020-01-29 11:15
Updated : 2020-01-31 10:33
NVD link : CVE-2013-2572
Mitre link : CVE-2013-2572
JSON object : View
CWE
CWE-798
Use of Hard-coded Credentials
Products Affected
tp-link
- tl-sc_4171g_firmware
- tl-sc_3130
- tl-sc_3130_firmware
- tl-sc_3171g
- tl-sc_4171g
- tl-sc_3171g_firmware
- tl-sc_3130g
- tl-sc_3130g_firmware