{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14553","assignerOrgId":"f23511db-6c3e-4e32-a477-6aa17d310630","state":"PUBLISHED","assignerShortName":"TPLink","dateReserved":"2025-12-11T22:58:26.015Z","datePublished":"2025-12-16T18:38:08.805Z","dateUpdated":"2026-01-09T00:48:59.820Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["Application"],"platforms":["Android"],"product":"TP-Link Tapo App","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.1.6","status":"affected","version":"0","versionType":"3.1.6"}]},{"defaultStatus":"unaffected","modules":["Application"],"platforms":["iOS"],"product":"TP-Link Tapo App","vendor":"TP-Link Systems Inc.","versions":[{"lessThan":"3.1.601","status":"affected","version":"0","versionType":"3.1.601"}]}],"credits":[{"lang":"en","type":"reporter","value":"Juraj Nyíri"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Exposure of password hashes through an unauthenticated API response in TP-Link Tapo app on iOS and Android for Tapo cameras, allowing attackers to brute force the password in the local network.&nbsp;Issue can be mitigated through mobile application updates. Device firmware remains unchanged."}],"value":"Exposure of password hashes through an unauthenticated API response in TP-Link Tapo app on iOS and Android for Tapo cameras, allowing attackers to brute force the password in the local network. Issue can be mitigated through mobile application updates. Device firmware remains unchanged."}],"impacts":[{"capecId":"CAPEC-55","descriptions":[{"lang":"en","value":"CAPEC-55 Rainbow Table Password Cracking"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"ADJACENT","baseScore":7,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"HIGH","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-200","description":"CWE-200 Exposure of Sensitive Information to an Unauthorized Actor","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f23511db-6c3e-4e32-a477-6aa17d310630","shortName":"TPLink","dateUpdated":"2026-01-09T00:48:59.820Z"},"references":[{"url":"https://apps.apple.com/us/app/tp-link-tapo/id1472718009"},{"url":"https://play.google.com/store/apps/details?id=com.tplink.iot"},{"url":"https://www.tp-link.com/us/support/faq/4840/"}],"source":{"discovery":"UNKNOWN"},"title":"Password Hash Leak Could Lead to Unauthorized Access on Tapo App via Local Network","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-16T19:09:57.442313Z","id":"CVE-2025-14553","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-16T19:10:54.148Z"}}]}}