TP-Link Tapo H200 V1 Smart Hub
From Wiki-IoT
Classification
| TP-Link Tapo H200 V1 Smart Hub | |
|---|---|
| Classification | |
| Grade | A+ |
| Calculator version | 1 |
| Classification date | 2025-10-15 |
| Information | |
| Name | TP-Link Tapo H200 Smart Hub |
| Brand by Parent | TP-Link / Tapo by TP-Link |
| Generation | V1 |
| Model(s) | H200 |
| Release date | 2023-03-08 |
| Type/Category | Smart Hub |
| Website | [1] |
| Status | In sale |
| More | |
| Dimensions | 71.45 × 71.45 × 31.25 mm |
| Mass | not clearly disclosed in source |
| Operating system | Embedded firmware |
| Companion App | Tapo app (iOS / Android) for configuration, management |
| CPU | not publicly disclosed |
| GPU | not publicly disclosed |
| Memory | not publicly disclosed |
| Storage | microSD card (up to 512 GB) |
| Battery | It is mains powered hub, no battery mentioned in specs st |
| Power | 9 V, 0.85 A (adapter) |
| Charging | Not applicable |
| Display | No display component |
| Camera | The hub itself does not include a camera |
| Sound | The hub plays ringtones / chimes but no “speaker/mic” is reported as a full sound system |
| Connectivity | 2.4 GHz Wi-Fi + Sub-1G wireless (for sensors / switches / devices) |
| Device | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Known hardware tampering | None | [2] | I found no credible reports of physical tampering attacks on this hub |
| Known vulnerabilities | None | [3] | There is a known moderate vulnerability, but it requires physical access and firmware reverse engineering |
| Prior attacks | None | [4] | Although the vulnerability is disclosed, I did not locate confirmed large-scale attacks |
| Updatability | Very common | [5] | The device supports firmware updates via the TP-Link / Tapo infrastructure |
| Category score | 1 | ||
| System | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Authentication with other systems | Full | [6] | Because it works with external ecosystems |
| Communications | Encrypted with up-to-date encryption | [7] | I did not find a public statement confirming that all communications |
| Storage | Encrypted with up-to-date encryption | [8] | no clear evidence that the stored data is encrypted at rest. |
| Category score | 1 | ||
| User Authentication | |||
|---|---|---|---|
| Criterion | Value | Proof(s) | Comment |
| Account management | Full | [9] | Users have full account-level control via the Tapo / TP-Link account |
| Authentication | Secure | [10] | Authentication uses passwords plus optional 2FA to secure logins |
| Brute-force protection | Exist | [11] | Likely there is some protection (rate limits, login throttling) though explicit documentation is weak |
| Event logging | Access event logged | [12] | It’s unclear if the hub logs all account or access events; there may be limited audit logs in app or cloud |
| Passwords | Require change after setup with complexity requirements | [13] | I did not find confirmation that the hub forces complexity or forces a password change on first setup |
| Category score | 1 | ||
| Grade | A+ |
|---|