CVE-2025-14553

N/A Unknown
Published: December 16, 2025 Modified: December 18, 2025

Description

Exposure of password hashes through an unauthenticated API response in TP-Link Tapo C210 V.1.8 app on iOS and Android, allowing attackers to brute force the password in the local network.Β Issue can be mitigated through mobile application updates. Device firmware remains unchanged.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://apps.apple.com/us/app/tp-link-tapo/id1472718009
Source: f23511db-6c3e-4e32-a477-6aa17d310630
https://play.google.com/store/apps/details?id=com.tplink.iot
Source: f23511db-6c3e-4e32-a477-6aa17d310630
https://www.tp-link.com/us/support/faq/4840/
Source: f23511db-6c3e-4e32-a477-6aa17d310630

3 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
0.0%
4th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)