Click to skip the navigation bar

Statement on Root Access via UART on Tapo D230S1 (CVE-2025-10991)

Security Advisory
Updated 09-30-2025 00:04:52 AM Number of views for this article176

Vulnerability Description:

The attacker may obtain root access by connecting to the UART port and this vulnerability requires the attacker to have the physical access to the device. This issue affects Tapo D230S1 V1.20: before 1.2.2 Build 20250907.

Impact:

This vulnerability may allow the attacker to control the device as the root user.

CVSS v4.0 Score: 7.0 / High

CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Affected Products/Versions and Fixes:

Affected Product Model

Related Vulnerabilities

Affected Version

Fixed Version

Tapo D230S1 V1.20

CVE-2025-10991

< 1.2.2 Build 20250907

1.2.2 Build 20250907

Recommendation(s):

We strongly recommended that users with the affected device(s) take the following action(s):

  1. Download and update to the latest firmware to fix the vulnerabilities by following the instructions here: https://www.tp-link.com/us/support/faq/2621/

Disclaimer:

If you do not take the recommended action(s) stated above, this vulnerability concern will remain. TP-Link cannot bear any responsibility for the consequences that could have been avoided by following the recommended action(s) in this statement.

Looking for More

Is this faq useful?

Your feedback helps improve this site.

Community

TP-Link Community

Still need help? Search for answers, ask questions, and get help from TP-Link experts and other users around the world.

Visit the Community >