Vulnerability Details CVE-2020-11445
TP-Link cloud cameras through 2020-02-09 allow remote attackers to bypass authentication and obtain sensitive information via vectors involving a Wi-Fi session with GPS enabled, aka CNVD-2020-04855.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.004
EPSS Ranking 60.4%
CVSS Severity
CVSS v3 Score 5.3
CVSS v2 Score 5.0
Products affected by CVE-2020-11445
-
cpe:2.3:h:tp-link:kc200:-
-
cpe:2.3:h:tp-link:kc300s2:-
-
cpe:2.3:h:tp-link:kc310s2:-
-
cpe:2.3:h:tp-link:nc200:-
-
cpe:2.3:h:tp-link:nc210:-
-
cpe:2.3:h:tp-link:nc220:-
-
cpe:2.3:h:tp-link:nc230:-
-
cpe:2.3:h:tp-link:nc250:-
-
cpe:2.3:h:tp-link:nc260:-
-
cpe:2.3:h:tp-link:nc450:-
-
cpe:2.3:h:tp-link:tapo_c100:-
-
cpe:2.3:h:tp-link:tapo_c200:-
-
cpe:2.3:h:tp-link:tl-sc3430:-
-
cpe:2.3:h:tp-link:tl-sc3430n:-
-
cpe:2.3:h:tp-link:tl-sc4171g:-
-
cpe:2.3:o:tp-link:kc200_firmware:2020-02-09
-
cpe:2.3:o:tp-link:kc300s2_firmware:2020-02-09
-
cpe:2.3:o:tp-link:kc310s2_firmware:2020-02-09
-
cpe:2.3:o:tp-link:nc200_firmware:2.1.10
-
cpe:2.3:o:tp-link:nc200_firmware:2.1.11
-
cpe:2.3:o:tp-link:nc200_firmware:2.1.6
-
cpe:2.3:o:tp-link:nc200_firmware:2.1.7
-
cpe:2.3:o:tp-link:nc200_firmware:2.1.8
-
cpe:2.3:o:tp-link:nc200_firmware:2.1.8_build_171109
-
cpe:2.3:o:tp-link:nc200_firmware:2.1.9
-
cpe:2.3:o:tp-link:nc200_firmware:2020-02-09
-
cpe:2.3:o:tp-link:nc210_firmware:1.0.10
-
cpe:2.3:o:tp-link:nc210_firmware:1.0.11
-
cpe:2.3:o:tp-link:nc210_firmware:1.0.3
-
cpe:2.3:o:tp-link:nc210_firmware:1.0.4
-
cpe:2.3:o:tp-link:nc210_firmware:1.0.9
-
cpe:2.3:o:tp-link:nc210_firmware:1.0.9_build_171214
-
cpe:2.3:o:tp-link:nc210_firmware:2020-02-09
-
cpe:2.3:o:tp-link:nc220_firmware:1.1.12
-
cpe:2.3:o:tp-link:nc220_firmware:1.1.14
-
cpe:2.3:o:tp-link:nc220_firmware:1.2.0
-
cpe:2.3:o:tp-link:nc220_firmware:1.3.0
-
cpe:2.3:o:tp-link:nc220_firmware:1.3.0_build_180105
-
cpe:2.3:o:tp-link:nc220_firmware:1.3.1
-
cpe:2.3:o:tp-link:nc220_firmware:1.3.2
-
cpe:2.3:o:tp-link:nc220_firmware:2020-02-09
-
cpe:2.3:o:tp-link:nc230_firmware:1.0.3
-
cpe:2.3:o:tp-link:nc230_firmware:1.2.1
-
cpe:2.3:o:tp-link:nc230_firmware:1.3.0
-
cpe:2.3:o:tp-link:nc230_firmware:1.3.0_build_171205
-
cpe:2.3:o:tp-link:nc230_firmware:1.3.1
-
cpe:2.3:o:tp-link:nc230_firmware:1.3.2
-
cpe:2.3:o:tp-link:nc230_firmware:2020-02-09
-
cpe:2.3:o:tp-link:nc250_firmware:1.0.10
-
cpe:2.3:o:tp-link:nc250_firmware:1.0.8
-
cpe:2.3:o:tp-link:nc250_firmware:1.2.1
-
cpe:2.3:o:tp-link:nc250_firmware:1.3.0
-
cpe:2.3:o:tp-link:nc250_firmware:1.3.0_build171205
-
cpe:2.3:o:tp-link:nc250_firmware:1.3.1
-
cpe:2.3:o:tp-link:nc250_firmware:1.3.2
-
cpe:2.3:o:tp-link:nc250_firmware:2020-02-09
-
cpe:2.3:o:tp-link:nc260_firmware:1.0.5
-
cpe:2.3:o:tp-link:nc260_firmware:1.0.6
-
cpe:2.3:o:tp-link:nc260_firmware:1.4.1
-
cpe:2.3:o:tp-link:nc260_firmware:1.5.0
-
cpe:2.3:o:tp-link:nc260_firmware:1.5.1
-
cpe:2.3:o:tp-link:nc260_firmware:1.5.1_build_190805
-
cpe:2.3:o:tp-link:nc260_firmware:1.5.2
-
cpe:2.3:o:tp-link:nc260_firmware:1.5.3
-
cpe:2.3:o:tp-link:nc260_firmware:1.5.4
-
cpe:2.3:o:tp-link:nc260_firmware:2020-02-09
-
cpe:2.3:o:tp-link:nc450_firmware:1.0.15
-
cpe:2.3:o:tp-link:nc450_firmware:1.1.1
-
cpe:2.3:o:tp-link:nc450_firmware:1.1.2
-
cpe:2.3:o:tp-link:nc450_firmware:1.1.6
-
cpe:2.3:o:tp-link:nc450_firmware:1.3.4
-
cpe:2.3:o:tp-link:nc450_firmware:1.5.0
-
cpe:2.3:o:tp-link:nc450_firmware:1.5.0_build_181022
-
cpe:2.3:o:tp-link:nc450_firmware:1.5.3
-
cpe:2.3:o:tp-link:nc450_firmware:1.5.4
-
cpe:2.3:o:tp-link:nc450_firmware:1.5.5
-
cpe:2.3:o:tp-link:nc450_firmware:2020-02-09
-
cpe:2.3:o:tp-link:tapo_c100_firmware:1.1.15
-
cpe:2.3:o:tp-link:tapo_c100_firmware:2020-02-09
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.1.22
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.2.2
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.4
-
cpe:2.3:o:tp-link:tapo_c200_firmware:1.3.9
-
cpe:2.3:o:tp-link:tapo_c200_firmware:2020-02-09
-
cpe:2.3:o:tp-link:tl-sc3430_firmware:2020-02-09
-
cpe:2.3:o:tp-link:tl-sc3430n_firmware:2020-02-09
-
cpe:2.3:o:tp-link:tl-sc4171g_firmware:2020-02-09