Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Path Traversal on TP-Link Tapo D235 and C260 via Local https
Vulnerability Description
A path traversal vulnerability was identified TP-Link Tapo C260 v1, D235 v1 and C520WS v2.6 within the HTTP server’s handling of GET requests. The server performs path normalization before fully decoding URL encoded input and falls back to using the raw path when normalization fails. An attacker can exploit this logic flaw by supplying crafted, URL encoded traversal sequences that bypass directory restrictions and allow access to files outside the intended web root. Successful exploitation may allow authenticated attackers to get disclosure of sensitive system files and credentials, while unauthenticated attackers may gain access to non-sensitive static assets.
CVSS Information
N/A
Vulnerability Type
对路径名的限制不恰当(路径遍历)
Vulnerability Title
TP-Link Tapo C260 安全漏洞
Vulnerability Description
TP-Link Tapo C260是中国普联(TP-Link)公司的一个监控摄像机。 TP-Link Tapo C260 v1版本存在安全漏洞,该漏洞源于对特定GET请求路径处理不当,可能导致本地未经验证的文件系统路径探测。
CVSS Information
N/A
Vulnerability Type
N/A