cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-10523,https://securityvulnerability.io/vulnerability/CVE-2024-10523,TP-Link IoT Smart Hub Vulnerability: Wi-Fi Credentials Stored in Plain Text,This vulnerability exists in TP-Link IoT Smart Hub due to storage of Wi-Fi credentials in plain text within the device firmware. An attacker with physical access could exploit this by extracting the firmware and analyzing the binary data to obtain the Wi-Fi credentials stored on the vulnerable device.,Tp-link,Tp-link Tapo H100 Iot Smart Hub,4.6,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2024-11-04T12:00:05.802Z,0 CVE-2024-31340,https://securityvulnerability.io/vulnerability/CVE-2024-31340,TP-Link Tether vulnerability allows remote unauthenticated attacker to eavesdrop on encrypted communication,"TP-Link Tether versions prior to 4.5.13 and TP-Link Tapo versions prior to 3.3.6 do not properly validate certificates, which may allow a remote unauthenticated attacker to eavesdrop on an encrypted communication via a man-in-the-middle attack.",Tp-link,"Tp-link Tether,Tp-link Tapo",,,0.00044999999227002263,false,false,false,false,,false,false,2024-05-22T05:29:04.007Z,0