ID

VAR-202308-3520


CVE

CVE-2023-41184


TITLE

TP-Link Tapo C210 ActiveCells Stack-based Buffer Overflow Remote Code Execution Vulnerability

Trust: 0.7

sources: ZDI: ZDI-23-1287

DESCRIPTION

TP-Link Tapo C210 ActiveCells Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of TP-Link Tapo C210 IP cameras. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the handling of the ActiveCells parameter of the CreateRules and ModifyRules APIs. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-20589. TP-LINK Tapo C210 is a network camera device from China's TP-LINK company

Trust: 2.07

sources: NVD: CVE-2023-41184 // ZDI: ZDI-23-1287 // CNVD: CNVD-2024-33678

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2024-33678

AFFECTED PRODUCTS

vendor:tp linkmodel:tapo c210scope: - version: -

Trust: 1.3

sources: ZDI: ZDI-23-1287 // CNVD: CNVD-2024-33678

CVSS

SEVERITY

CVSSV2

CVSSV3

zdi-disclosures@trendmicro.com: CVE-2023-41184
value: MEDIUM

Trust: 1.0

ZDI: CVE-2023-41184
value: MEDIUM

Trust: 0.7

CNVD: CNVD-2024-33678
value: HIGH

Trust: 0.6

CNVD: CNVD-2024-33678
severity: HIGH
baseScore: 7.2
vectorString: AV:A/AC:L/AU:M/C:C/I:C/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: MULTIPLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 4.1
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

zdi-disclosures@trendmicro.com: CVE-2023-41184
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: CVSS:3.0/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 1.0

ZDI: CVE-2023-41184
baseSeverity: MEDIUM
baseScore: 6.8
vectorString: AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.9
impactScore: 5.9
version: 3.0

Trust: 0.7

sources: ZDI: ZDI-23-1287 // CNVD: CNVD-2024-33678 // NVD: CVE-2023-41184

PROBLEMTYPE DATA

problemtype:CWE-121

Trust: 1.0

sources: NVD: CVE-2023-41184

PATCH

title:Fixed in firmware: 1.3.6 Build 230426 Rel.48373n #Firmware-Release-Notesurl:https://www.tp-link.com/en/support/download/tapo-c210/

Trust: 0.7

title:Patch for TP-LINK Tapo C210 Stack Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/574186

Trust: 0.6

sources: ZDI: ZDI-23-1287 // CNVD: CNVD-2024-33678

EXTERNAL IDS

db:NVDid:CVE-2023-41184

Trust: 2.3

db:ZDIid:ZDI-23-1287

Trust: 1.7

db:ZDI_CANid:ZDI-CAN-20589

Trust: 0.7

db:CNVDid:CNVD-2024-33678

Trust: 0.6

sources: ZDI: ZDI-23-1287 // CNVD: CNVD-2024-33678 // NVD: CVE-2023-41184

REFERENCES

url:https://www.zerodayinitiative.com/advisories/zdi-23-1287/

Trust: 1.0

url:https://www.tp-link.com/en/support/download/tapo-c210/

Trust: 0.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2023-41184

Trust: 0.6

sources: ZDI: ZDI-23-1287 // CNVD: CNVD-2024-33678 // NVD: CVE-2023-41184

CREDITS

Cyrille Chatras

Trust: 0.7

sources: ZDI: ZDI-23-1287

SOURCES

db:ZDIid:ZDI-23-1287
db:CNVDid:CNVD-2024-33678
db:NVDid:CVE-2023-41184

LAST UPDATE DATE

2024-09-19T23:06:29.264000+00:00


SOURCES UPDATE DATE

db:ZDIid:ZDI-23-1287date:2023-08-31T00:00:00
db:CNVDid:CNVD-2024-33678date:2024-07-26T00:00:00
db:NVDid:CVE-2023-41184date:2024-09-18T19:15:34.603

SOURCES RELEASE DATE

db:ZDIid:ZDI-23-1287date:2023-08-31T00:00:00
db:CNVDid:CNVD-2024-33678date:2024-07-25T00:00:00
db:NVDid:CVE-2023-41184date:2024-05-03T03:15:28.073