Internet

These TP-Link bulbs allow attackers to hack your Wi-Fi network, don’t use them!

Having home automation devices at home is something that is becoming more widespread. It is very useful, since it allows you to automate tasks, control devices remotely or even save energy, but you must take into account the risks. And yes, they are devices connected to the network and can become vulnerable. Something like this is what has happened with some TP-Link bulbs, which we are going to talk about in this article. They can be exploited to reach steal Wi-Fi network password of the victim.

A smart bulb can be connected to the router, just like any other device you have at home. This means that, through a mobile application, you can turn it on or off, even without being at home. There are also models that have motion sensors, that change color depending on the sound, etc.

Vulnerable TP-Link bulbs

These are four vulnerabilities that affect smart bulbs TP-Link Tapo L530E and to the Tapo application. These security flaws could be exploited by an attacker to steal the Wi-Fi password. It must be borne in mind that it is a very popular model, widely sold on platforms such as Amazon. Therefore, it can affect many users.

This problem has been detected by a group of security researchers from both Italy and the UK. They decided to test the product, given its popularity, and found these flaws. A problem that highlights, once again, the importance of using reliable and up-to-date devices.

One of these vulnerabilities consists of a incorrect authentication on Tapo L503E. Attackers could impersonate the device at the time of the session key exchange. It is considered a high severity vulnerability and has received a score of 8.8. Allows the attacker to recover passwords and control Tapo devices.

Another vulnerability, with a score of 7.6, is how attackers can brute-force short-lived verification shared keys. On the other hand, the third flaw is of medium severity and is related to the lack of randomness during symmetric encryption. The fourth bug is a bug that keeps session keys valid for 24 hours and allows an attacker to replay messages during that time.

Of these four flaws, the ones that security researchers are most concerned about are the first two. An attacker could access the Tapo app and obtain the Wi-Fi network name and password. In this way, you would have full access to the network.

updates

When vulnerabilities of this type arise, it is the manufacturers themselves who launch updates to correct the problem. This is essential, since without these new versions the bugs could be exploited indefinitely. Hence the importance of always having the latest versions and keeping everything updated.

For now, it is unknown when and how TP-Link will update its devices. However, security researchers have indicated that the company has already contacted them and indicated that they are working to offer a solution and prevent them from exploiting these vulnerabilities.

From RedesZone, in case you have light bulbs of this type, we recommend that you take measures to protect your Wi-Fi network. It is good to change the password, as well as having the router updated. You should do the same with the bulb itself and the mobile application: update to the latest available versions. Just as there are mistakes that you should avoid when buying a router, the same thing when buying any other device that you connect to the network.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *