A Case of Smart Devices That Compromise Home Cybersecurity

After conducting a Penetration Testing session across multiple devices within the TP-Link Tapo IoT ecosystem, we identified four vulnerabilities enabling five different potential exploits.

Work

"A case of smart devices that compromise home cybersecurity" is the description of a Penetration Testing session on six different IoT devices belonging to the TP-Link Tapo IoT ecosystem. The studied devices are the Tapo L530E, the Tapo P100, the Tapo C200, the Tapo L510E V2, the Tapo L630 and the Tapo L900. During the session we found four vulnerabilities that allow for five exploits. Due to the authentication not being well accounted for and the confidentiality not sufficiently guaranteed by the implemented cryptographic measures, the attacker can operate at will all devices of the Tapo family that the user may have on her Tapo account and learn the victim's Wi-Fi password, thereby escalating their malicious potential considerably.


The tested firmware versions of each device are:

Device Vulnerable Version Fixed Version
L530E 1.1.9 1.2.4
P100 1.4.9 and 1.4.16 1.5.0
C200 1.1.18 -
L510E V2 1.0.8 1.1.0
L630 1.0.3 1.0.4
L900 1.0.17 1.1.0

TP-Link acknowledged the issues we responsibly reported through their Product Security Advisory (PSA). We actively collaborated with them by testing the fixes and confirming that the attack scenarios are no longer exploitable or do not give the attacker any advantage. TP-Link confirmed that they already released the necessary fixes to address the vulnerabilities and that the changes do not affect the normal use and stability of the products.


The vulnerabilities that affect each device are:

Device Vulnerability 1 Vulnerability 2 Vulnerability 3 Vulnerability 4
L530E 🐞 🐞 🐞 🐞
P100 🐞 🐞 🐞 🐞
C200 🛡️ 🐞 🛡️ 🛡️
L510E V2 🐞 🐞 🐞 🐞
L630 🐞 🐞 🐞 🐞
L900 🐞 🐞 🐞 🐞

🐞 if the vulnerability is present, 🛡️ otherwise.

Exploits


Vulnerabilities exploitable by target devices for firmware without fixes:

EX1.1 EX1.2 EX2.1 EX3.1 EX4.1
L530E 🐞 🐞 🐞 🐞 🐞
P100 🐞 🐞 🐞 🐞 🐞
C200 🛡️ 🛡️ 🐞 🛡️ 🛡️
L510E V2 🐞 🐞 🐞 🐞 🐞
L630 🐞 🐞 🐞 🐞 🐞
L900 🐞 🐞 🐞 🐞 🐞

🐞 if the vulnerability is exploitable, 🛡️ otherwise.

Responsible Disclosure

Complete Timeline of the Responsible Disclosure Process

Publications

Smart Bulbs can be Hacked to Hack into your Household

Smart Bulbs can be Hacked to Hack into your Household was reported by Davide Bonaventura, Sergio Esposito, and Giampaolo Bella. The paper is published in the 20th SECRYPT International Conference on Security and Cryptography (SECRYPT 2023)'s proceedings.

Understanding IoT Security: A Case Study on Smart Bulbs

The IoT Breaches Your Household Again was reported by Davide Bonaventura, Sergio Esposito, and Giampaolo Bella. The paper is published in the 21th SECRYPT International Conference on Security and Cryptography (SECRYPT 2024)'s proceedings.

Cryptographic Challenges in IoT Devices

A case of smart devices that compromise home cybersecurity was reported by Davide Bonaventura, Sergio Esposito, and Giampaolo Bella. This research is published in Volume 151 of Elsevier's Computers & Security journal.

Davide Bonaventura

M.Sc. at Università degli Studi di Catania

Visit LinkedIn
Sergio Esposito

Professor at Università degli Studi di Catania

Visit Homepage
Giampaolo Bella

Professor at Università degli Studi di Catania

Visit Homepage

CVE

Common Vulnerabilities and Exposures

CVE Entries assigned to the vulnerabilities described in our papers are the following:

Q&A

Questions and Answers

Most likely. We have tested the attacks using the following devices:

  • A smart bulb Tapo series L530 with Firmware Version 1.1.9
  • A smart bulb Tapo series L510 with Firmware Version 1.0.8
  • A smart bulb Tapo series L630 with Firmware Version 1.0.3
  • A smart plug Tapo series P100 with Firmware Versions 1.4.9 and 1.4.16
  • A smart camera Tapo series C200 with Firmware Version 1.1.18
  • A Tapo application Version 2.8.14

Most likely the attack also works with other versions prior to the versions containing the fix.

All Tapo devices using the described protocol. Vulnerabilities are not implementation-oriented, but design-oriented. This means that all devices using the same protocol used by the tested devices are vulnerable to the described attacks.

Change the password of both your Tapo account and your Wi-Fi network. This allows you to disconnect all devices connected without your consent to your Tapo account or your Wi-Fi network.

Make sure that only devices known to you have access to the Wi-Fi network your smart device is connected to. The attacker can only carry out attacks when they can communicate directly with the smart device.

When you reset your smart device, pay attention to the Wi-Fi network you connect to complete the configuration process. The network you are connected to may be controlled by the attacker and not the network started by your smart device.

Make sure you do not disclose your Tapo ID. The Tapo ID allows your Tapo application to recognize the devices associated with your account. Through it, the attacker can authenticate to your Tapo application as a device associated with it.

We are not aware of the vulnerabilities being exploited in the wild.

Yes. TP-Link has released a new version of both firmware and the application that is resistant to attacks. Make sure you update both.