CVE-2026-0918

The Tapo C220 v1 and C520WS v2 cameras’ HTTP service does not safely handle POST requests containing an excessively large Content-Length header. The resulting failed memory allocation triggers a NULL pointer dereference, causing the main service process to crash. An unauthenticated attacker can repeatedly crash the service, causing temporary denial of service. The device restarts automatically, and repeated requests can keep it unavailable.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c220_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c220:1:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c520ws:2:*:*:*:*:*:*:*

History

16 Mar 2026, 18:16

Type Values Removed Values Added
References
  • () https://www.crac-learning.com/post/smart-home-security-research-cve-2026-0918-assigned -

11 Mar 2026, 22:26

Type Values Removed Values Added
CPE cpe:2.3:h:tp-link:tapo_c520ws:2:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c220:1:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tapo_c220_firmware:*:*:*:*:*:*:*:*
First Time Tp-link
Tp-link tapo C220 Firmware
Tp-link tapo C220
Tp-link tapo C520ws Firmware
Tp-link tapo C520ws
References () https://www.tp-link.com/en/support/download/tapo-c220/v1/ - () https://www.tp-link.com/en/support/download/tapo-c220/v1/ - Product
References () https://www.tp-link.com/en/support/download/tapo-c520ws/v2/ - () https://www.tp-link.com/en/support/download/tapo-c520ws/v2/ - Product
References () https://www.tp-link.com/us/support/download/tapo-c100/v5/ - () https://www.tp-link.com/us/support/download/tapo-c100/v5/ - Product
References () https://www.tp-link.com/us/support/download/tapo-c220/v1.60/ - () https://www.tp-link.com/us/support/download/tapo-c220/v1.60/ - Product
References () https://www.tp-link.com/us/support/download/tapo-c520ws/v2/ - () https://www.tp-link.com/us/support/download/tapo-c520ws/v2/ - Product
References () https://www.tp-link.com/us/support/faq/4923/ - () https://www.tp-link.com/us/support/faq/4923/ - Vendor Advisory
Summary
  • (es) El servicio HTTP de las cámaras Tapo C220 v1 y C520WS v2 no maneja de forma segura las solicitudes POST que contienen una cabecera Content-Length excesivamente grande. La asignación de memoria fallida resultante desencadena una desreferenciación de puntero NULL, provocando la caída del proceso del servicio principal. Un atacante no autenticado puede provocar la caída repetida del servicio, causando una denegación de servicio temporal. El dispositivo se reinicia automáticamente, y las solicitudes repetidas pueden mantenerlo no disponible.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

10 Feb 2026, 00:16

Type Values Removed Values Added
References
  • () https://www.tp-link.com/us/support/download/tapo-c100/v5/ -

27 Jan 2026, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-27 18:15

Updated : 2026-03-16 18:16


NVD link : CVE-2026-0918

Mitre link : CVE-2026-0918

CVE.ORG link : CVE-2026-0918


JSON object : View

Products Affected

tp-link

  • tapo_c520ws
  • tapo_c520ws_firmware
  • tapo_c220
  • tapo_c220_firmware
CWE
CWE-476

NULL Pointer Dereference