Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-15557
PUBLISHED
More InfoOfficial Page
Assigner-TPLink
Assigner Org ID-f23511db-6c3e-4e32-a477-6aa17d310630
View Known Exploited Vulnerability (KEV) details
Published At-05 Feb, 2026 | 17:45
Updated At-05 Feb, 2026 | 20:33
Rejected At-
▼CVE Numbering Authority (CNA)
Improper Certificate Validation in TP-Link Tapo H100 and P100 Allows Man-in-the-Middle Attack

An Improper Certificate Validation vulnerability in TP-Link Tapo H100 v1 and Tapo P100 v1 allows an on-path attacker on the same network segment to intercept and modify encrypted device-cloud communications.  This may compromise the confidentiality and integrity of device-to-cloud communication, enabling manipulation of device data or operations.

Affected Products
Vendor
TP-Link Systems Inc.
Product
Tapo H100 v1
Default Status
unaffected
Versions
Affected
  • From 0 before 1.6.1 (custom)
Vendor
TP-Link Systems Inc.
Product
Tapo P100 v1
Default Status
unaffected
Versions
Affected
  • From 0 before 1.2.6 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-295CWE-295 Improper Certificate Validation
Type: CWE
CWE ID: CWE-295
Description: CWE-295 Improper Certificate Validation
Metrics
VersionBase scoreBase severityVector
4.07.5HIGH
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Version: 4.0
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-94CAPEC-94 Adversary in the Middle (AiTM)
CAPEC ID: CAPEC-94
Description: CAPEC-94 Adversary in the Middle (AiTM)
Solutions

Configurations

Workarounds

Exploits

Credits

finder
Jere Ainasoja and Jack Sundholm from Test of Things
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.tp-link.com/us/support/download/tapo-h100/
patch
https://www.tp-link.com/us/support/download/tapo-p100/
patch
https://www.tp-link.com/en/support/download/tapo-h100/
patch
https://www.tp-link.com/en/support/download/tapo-p100/
patch
https://www.tp-link.com/us/support/faq/4949/
vendor-advisory
Hyperlink: https://www.tp-link.com/us/support/download/tapo-h100/
Resource:
patch
Hyperlink: https://www.tp-link.com/us/support/download/tapo-p100/
Resource:
patch
Hyperlink: https://www.tp-link.com/en/support/download/tapo-h100/
Resource:
patch
Hyperlink: https://www.tp-link.com/en/support/download/tapo-p100/
Resource:
patch
Hyperlink: https://www.tp-link.com/us/support/faq/4949/
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found