Welcome Guest ( Log In | Register )

Outline · [ Standard ] · Linear+

 TP-Link Tapo smart bulb vulnerabilities could, expose Wi-Fi passwords to attackers

views
     
TSdaisiesdontdoit92
post Aug 25 2023, 10:02 AM, updated 3y ago

On my way
****
Junior Member
580 posts

Joined: Jan 2020


Fixes will be released "in due course"
QUOTE
Why it matters: You're probably familiar with TP-Link's Tapo smart bulbs. They're incredibly popular, especially on Amazon, and the companion app has over 10 million downloads on Google Play. But researchers have discovered four vulnerabilities in a specific model of bulb and the Tapo app that could allow attackers to steal Wi-Fi passwords, among other things.

As reported by Bleeping Computer, researchers from Universita di Catania and the University of London wrote in a paper that IoT products are becoming increasingly pervasive. As such, they wanted to conduct a vulnerability assessment and penetration testing session on the Tapo L530E, currently the best-selling smart bulb on Amazon Italy.

The results were not good for TP-Link. Researchers found four vulnerabilities, the first of which was calculated as having the highest CVSS v3.1 vulnerability score: 8.8, making it high severity. It's due to a lack of smart bulb authentication with the Tapo app, allowing attackers to impersonate the bulb during the session key exchange step.

The vulnerability, present in all Tapo smart devices that use the TSKEP protocol, allows hackers to retrieve Tapo user passwords and manipulate Tapo devices.

The second flaw is also classed as high severity (7.6 score) and stems from a hard-coded short checksum shared secret. This lets an adjacent attacker obtain the secret used for authentication during the Bulb Discovery phase via a brute-force attack or by decompiling the Tapo app.

The third security issue (4.6 score) is a lack of randomness during symmetric encryption that enables an attacker to make the cryptographic scheme predictable.

The final vulnerability (5.7 score) relates to insufficient message freshness, which keeps session keys valid for 24 hours and allows attackers to replay messages during that period.

There are several scenarios in which someone could exploit the vulnerabilities, the most serious being bulb impersonation and retrieval of Tapo user account details. This could allow an attacker access to the Tapo app and, among other things, steal a user's Wi-Fi password. While the device needs to be in setup mode for the attack to work, the attacker can repeatedly deauthenticate a bulb, forcing a user to run the setup again.

The researchers also warned of Man-In-The-Middle attacks with a configured and unconfigured Tapo L530E device, letting attackers intercept communications and retrieve Tapo passwords, SSIDs, and Wi-Fi passwords.

The good news is that the vulnerabilities have been reported to TP-Link via its Vulnerability Research Program (VRP). The company acknowledged all of them and said it has started working on fixes both at the app and at the bulb firmware levels. No word on when they will get here beyond their release "in due course."

https://www.techspot.com/news/99869-tp-link...uld-expose.html

Moogle Stiltzkin
post Oct 27 2025, 01:27 PM

Look at all my stars!!
*******
Senior Member
4,475 posts

Joined: Jan 2003
QUOTE(daisiesdontdoit92 @ Aug 25 2023, 10:02 AM)
oof. i missed this. so in 2025 did they fix this?

Is a tapo L535E safe to buy and use? hmm.gif


i found this


QUOTE
An issue in TPLink Smart Bulb Tapo series L530 1.1.9, L510E 1.0.8, L630 1.0.3, P100 1.4.9, Smart Camera Tapo series C200 1.1.18, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the authentication code for the UDP message.

https://www.cvedetails.com/cve/CVE-2023-38906/


QUOTE
An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the TSKEP authentication function.

https://www.cvedetails.com/cve/CVE-2023-38908/



QUOTE
An issue in TPLink Smart Bulb Tapo series L530 before 1.2.4, L510E before 1.1.0, L630 before 1.0.4, P100 before 1.5.0, and Tapo Application 2.8.14 allows a remote attacker to obtain sensitive information via the IV component in the AES128-CBC function.

https://www.cvedetails.com/cve/CVE-2023-38909/


*the cve mentioned tapo L530E



statement from tplink concerning those 3 cves

https://www.tp-link.com/us/support/faq/3722/


so according to tplink/tapo they releaased firmware and app update to fix the issues. i didn't hear anyone else disputing it, so i assume it has been fixed?



I use 2 of these tapo L535E and dump them on the iot wifi ssid. So they are separate from the private network to begin with. also seems like the firmware and app updates claim to have solved the issue (the L535E wasn't even mentioned in changelog, so i assume this problem was only for the L530E and older light bulb models. specifically those who didn't update to latest firmware for both the bulb and the app)

This post has been edited by Moogle Stiltzkin: Oct 27 2025, 01:50 PM

 

Change to:
| Lo-Fi Version
0.0162sec    0.47    5 queries    GZIP Disabled
Time is now: 19th December 2025 - 05:52 PM