Description
A Security Bypass vulnerability exists in TP-LINK IP Cameras TL-SC 3130, TL-SC 3130G, 3171G, 4171G, and 3130 1.6.18P12 due to default hard-coded credentials for the administrative Web interface, which could let a malicious user obtain unauthorized access to CGI files.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Core Security · textwebappshardware
https://www.exploit-db.com/exploits/25812
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry x_refsource_misc
http://www.securityfocus.com/bid/60194
Exploit, Patch, Third Party Advisory, VDB Entry x_refsource_misc
http://www.exploit-db.com/exploits/25812
Third Party Advisory, VDB Entry x_refsource_misc
https://exchange.xforce.ibmcloud.com/vulnerabilities/84573
Exploit, Patch, Third Party Advisory x_refsource_misc
https://www.coresecurity.com/advisories/tp-link-ip-cameras-multiple-vulnerabilities
Third Party Advisory, VDB Entry x_refsource_misc
https://packetstormsecurity.com/files/cve/CVE-2013-2572
Scores
CVSS v3
7.5
EPSS
0.4929
EPSS Percentile
97.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CWE
CWE-798
Status
published
Products (4)
tp-link/tl-sc_3130_firmware
< 1.6.18p12
tp-link/tl-sc_3130g_firmware
< 1.6.18p12
tp-link/tl-sc_3171g_firmware
< 1.6.18p12
tp-link/tl-sc_4171g_firmware
< 1.6.18p12
Published
Jan 29, 2020
Tracked Since
Feb 18, 2026