CVE-2026-0919

The HTTP parser of Tapo C220 v1 and C520WS v2 cameras improperly handles requests containing an excessively long URL path. An invalid‑URL error path continues into cleanup code that assumes allocated buffers exist, leading to a crash and service restart. An unauthenticated attacker can force repeated service crashes or device reboots, causing denial of service.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c220_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c220:1:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c520ws:2:*:*:*:*:*:*:*

History

11 Mar 2026, 22:23

Type Values Removed Values Added
Summary
  • (es) El analizador HTTP de las cámaras Tapo C220 v1 y C520WS v2 maneja incorrectamente las solicitudes que contienen una ruta URL excesivamente larga. Una ruta de error de URL no válida continúa hacia el código de limpieza que asume la existencia de búferes asignados, lo que provoca un fallo y un reinicio del servicio. Un atacante no autenticado puede forzar repetidos fallos del servicio o reinicios del dispositivo, causando denegación de servicio.
References () https://www.tp-link.com/en/support/download/tapo-c220/v1/ - () https://www.tp-link.com/en/support/download/tapo-c220/v1/ - Product
References () https://www.tp-link.com/en/support/download/tapo-c520ws/v2/ - () https://www.tp-link.com/en/support/download/tapo-c520ws/v2/ - Product
References () https://www.tp-link.com/us/support/download/tapo-c220/v1.60/ - () https://www.tp-link.com/us/support/download/tapo-c220/v1.60/ - Product
References () https://www.tp-link.com/us/support/download/tapo-c520ws/v2/ - () https://www.tp-link.com/us/support/download/tapo-c520ws/v2/ - Product
References () https://www.tp-link.com/us/support/faq/4923/ - () https://www.tp-link.com/us/support/faq/4923/ - Vendor Advisory
CPE cpe:2.3:h:tp-link:tapo_c520ws:2:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c220:1:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:tp-link:tapo_c220_firmware:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
First Time Tp-link
Tp-link tapo C220 Firmware
Tp-link tapo C220
Tp-link tapo C520ws Firmware
Tp-link tapo C520ws
CWE NVD-CWE-noinfo

27 Jan 2026, 18:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-27 18:15

Updated : 2026-03-11 22:23


NVD link : CVE-2026-0919

Mitre link : CVE-2026-0919

CVE.ORG link : CVE-2026-0919


JSON object : View

Products Affected

tp-link

  • tapo_c520ws
  • tapo_c520ws_firmware
  • tapo_c220
  • tapo_c220_firmware
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo