### [CVE-2021-4045](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-4045) ![](https://img.shields.io/static/v1?label=Product&message=Tapo%20C200&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.15%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-77%20Improper%20Neutralization%20of%20Special%20Elements%20used%20in%20a%20Command%20('Command%20Injection')&color=brightgreen) ### Description TP-Link Tapo C200 IP camera, on its 1.1.15 firmware version and below, is affected by an unauthenticated RCE vulnerability, present in the uhttpd binary running by default as root. The exploitation of this vulnerability allows an attacker to take full control of the camera. ### POC #### Reference - http://packetstormsecurity.com/files/168472/TP-Link-Tapo-c200-1.1.15-Remote-Code-Execution.html #### Github - https://github.com/0xbinder/CVE-2021-4045 - https://github.com/0xor0ne/awesome-list - https://github.com/ARPSyndicate/cvemon - https://github.com/Azathothas/Stars - https://github.com/AzhariRamadhan/CVE-tplink-cp210-Command-Injection - https://github.com/B3nj4h/CVE-2021-4045 - https://github.com/DorskFR/tapodate - https://github.com/IamAlch3mist/Awesome-Embedded-Systems-Vulnerability-Research - https://github.com/Jalexander798/JA_Tools-Cybersecurity-Resource-2 - https://github.com/LassiHeikkila/ComputerSecurityProject2022 - https://github.com/NaInSec/CVE-PoC-in-GitHub - https://github.com/NoDataFound/hackGPT - https://github.com/Nop3z/IOTsec-all-in-one - https://github.com/SYRTI/POC_to_review - https://github.com/Syntanyl2/csb-yhlmjt - https://github.com/Try-H4ck-M3/Tapo-C200-Control - https://github.com/WhooAmii/POC_to_review - https://github.com/antonlevashov/gpt_analyst - https://github.com/attilaszia/linux-iot-cves - https://github.com/bachkhoasoft/awesome-list-ks - https://github.com/binganao/vulns-2022 - https://github.com/cyber-defence-campus/mole - https://github.com/danydodson/hackGPT - https://github.com/dt3211776496/hackgpt - https://github.com/dt3211776496/hackgpt1 - https://github.com/hacefresko/CVE-2021-4045 - https://github.com/hacefresko/CVE-2021-4045-PoC - https://github.com/jeffbezosispogg/CVE-2021-4045 - https://github.com/k0mi-tg/CVE-POC - https://github.com/manas3c/CVE-POC - https://github.com/moomoo12345/hackgpt - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/obscure88/HackGPT - https://github.com/onebytex/CVE-2021-4045 - https://github.com/pl4int3xt/CVE-2021-4045 - https://github.com/plzheheplztrying/cve_monitor - https://github.com/siddharth786s1/hackgpt - https://github.com/soosmile/POC - https://github.com/thenextconn/mygpt - https://github.com/trhacknon/Pocingit - https://github.com/whoforget/CVE-POC - https://github.com/yadrychnikovNicolay/bc_ad_lab - https://github.com/ynicolay/bc_ad_lab - https://github.com/youwizard/CVE-POC - https://github.com/zecool/cve - https://github.com/zhanpengliu-tencent/medium-cve