{"vulnerability": "CVE-2023-34829", "sightings": [{"uuid": "2ac0d6c5-f91c-4b8d-8bc8-c3de5a314753", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34829", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/12341", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-34829\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Incorrect access control in TP-Link Tapo before v3.1.315 allows attackers to access user credentials in plaintext.\n\ud83d\udccf Published: 2023-12-28T00:00:00.000Z\n\ud83d\udccf Modified: 2025-04-17T20:32:57.968Z\n\ud83d\udd17 References:\n1. https://github.com/SecureScripts/TP-Link_Tapo_Hack", "creation_timestamp": "2025-04-17T20:58:05.000000Z"}, {"uuid": "e9618ff7-59f2-4ab4-8712-51ff17fb7e65", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34829", "type": "seen", "source": "https://t.me/ctinow/163665", "content": "https://ift.tt/5KT3A40\nCVE-2023-34829 Exploit", "creation_timestamp": "2024-01-05T19:17:21.000000Z"}, {"uuid": "74dbd9fc-6e66-470d-85d7-4dfb5f8ef25c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34829", "type": "seen", "source": "https://t.me/ctinow/170543", "content": "https://ift.tt/eqbgzcY\nCVE-2023-34829 | TP-Link Tapo prior 3.1.315 access control", "creation_timestamp": "2024-01-20T07:11:58.000000Z"}, {"uuid": "e11910e3-86c2-4e8b-ab72-2a7218c10ec4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-34829", "type": "seen", "source": "https://t.me/ctinow/159915", "content": "https://ift.tt/qBt8iyf\nCVE-2023-34829", "creation_timestamp": "2023-12-28T04:26:28.000000Z"}]}