The HTTP parser of Tapo C220 v1 and C520WS v2 cameras improperly handles requests containing an excessively long URL path. An invalid‑URL error path continues into cleanup code that assumes allocated buffers exist, leading to a crash and service restart. An unauthenticated attacker can force repeated service crashes or device reboots, causing denial of service.
References
Configurations
History
11 Mar 2026, 22:23
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://www.tp-link.com/en/support/download/tapo-c220/v1/ - Product | |
| References | () https://www.tp-link.com/en/support/download/tapo-c520ws/v2/ - Product | |
| References | () https://www.tp-link.com/us/support/download/tapo-c220/v1.60/ - Product | |
| References | () https://www.tp-link.com/us/support/download/tapo-c520ws/v2/ - Product | |
| References | () https://www.tp-link.com/us/support/faq/4923/ - Vendor Advisory | |
| CPE | cpe:2.3:h:tp-link:tapo_c520ws:2:*:*:*:*:*:*:* cpe:2.3:h:tp-link:tapo_c220:1:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:tp-link:tapo_c220_firmware:*:*:*:*:*:*:*:* |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
Tp-link
Tp-link tapo C220 Firmware Tp-link tapo C220 Tp-link tapo C520ws Firmware Tp-link tapo C520ws |
|
| CWE | NVD-CWE-noinfo |
27 Jan 2026, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-27 18:15
Updated : 2026-03-11 22:23
NVD link : CVE-2026-0919
Mitre link : CVE-2026-0919
CVE.ORG link : CVE-2026-0919
JSON object : View
Products Affected
tp-link
- tapo_c520ws
- tapo_c520ws_firmware
- tapo_c220
- tapo_c220_firmware
CWE
