Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%
Get alerts for future matching vulnerabilitiesLog in to subscribe
I. Basic Information for CVE-2013-2572
Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A Security Bypass vulnerability exists in TP-LINK IP Cameras TL-SC 3130, TL-SC 3130G, 3171G, 4171G, and 3130 1.6.18P12 due to default hard-coded credentials for the administrative Web interface, which could let a malicious user obtain unauthorized access to CGI files.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
多款TP-LINK产品信任管理问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
TP-LINK IP Camera是中国普联(TP-LINK)公司的一款网络摄像机产品。该产品带有无线连接功能,可以通过无线连接对其进行设置与管理,默认的管理IP为DHCP获取。 多款TP-LINK产品中存在信任管理问题漏洞,该漏洞源于硬编码证书。攻击者可利用该漏洞获得对受影响设备的访问权限。以下产品及版本受到影响:使用1.6.18P12及之前版本固件的TP-LINK IP Cameras TL-SC 3130;使用1.6.18P12及之前版本固件的TL-SC 3130G;使用1.6.18P12及之前版本
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)
Affected Products
VendorProductAffected VersionsCPESubscribe
-n/a n/a -
II. Public POCs for CVE-2013-2572
#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC
III. Intelligence Information for CVE-2013-2572
Please Login to view more intelligence information
IV. Related Vulnerabilities
V. Comments for CVE-2013-2572

No comments yet


Leave a comment