TP-Link Tapo 520WS I missed the languages ​​in the camera software, why?

TP-Link Tapo 520WS I missed the languages ​​in the camera software, why?

TP-Link Tapo 520WS I missed the languages ​​in the camera software, why?
TP-Link Tapo 520WS I missed the languages ​​in the camera software, why?
Yesterday

Is there anyone who can explain to me why you discriminate against us as if we have not officially purchased and used your products? Who and why decided to deprive so many countries of support for their language in the software?

I will be very precise and clear!
TP-Link Tapo 3.4.810
By TP-LINK SYSTEMS INC.
App: Tapo
Version: 3.4.810 (1590)
Languages: 75
Then you start with your nonsense:
TP-Link Tapo 3.5.116 (120-640dpi) (Android 5.0+)
By TP-LINK SYSTEMS INC.
App: Tapo
Version: 3.5.116 (2016)
Languages: 24
until the latest official version:
App: Tapo
Version: 3.7.811 (4561)
Languages: 24
Package: com.tplink.iot

I want to know why you deprive me of my native language in your camera app, but in your TP-Link Tether router app, my native language continues to be present there?
So, when we touch on the topic of your routers, an even bigger question arises!

In October, Microsoft revealed a complex network of compromised devices that Chinese hackers were using to carry out coordinated attacks against Microsoft Azure customers, including think tanks, government and non-government organizations, and U.S. Department of Defense vendors. This network, dubbed CovertNetwork-1658, has been actively stealing credentials from customers since August 2023. The attacks used a botnet of thousands of routers, cameras, and other internet-connected devices for small and home offices (SOHOs). At its peak, the botnet contained more than 16,000 devices, most of which were TP-Link routers.

There have been numerous cases where vulnerabilities have been discovered in TP-Link routers.
In May, a critical vulnerability with a CVSS score of 10.0 was discovered in the Archer tri-band gaming router. Using it, an unauthenticated attacker could inject malicious commands and gain full remote code execution privileges on the vulnerable device.

In 2023, it was reported that Chinese state hackers were infecting TP-Link routers with custom malicious firmware. This news came just a few months after the US government said that operators of the Mirai botnet were using TP-Link routers for DDoS attacks.

Now I hope everyone will understand what kind of company you are and what your products are actually used for, and stop lying, because they will not help you get your products banned from sale!!!

 

  0      
  0      
#1
Options

Information

Helpful: 0

Views: 44

Replies: 0

Related Articles