CVE-2026-34118

A heap-based buffer overflow vulnerability was identified in TP-Link Tapo C520WS v2.6 in the HTTP POST body parsing logic due to missing validation of remaining buffer capacity after dynamic allocation, due to insufficient boundary validation when handling externally supplied HTTP input.  An attacker on the same network segment could trigger heap memory corruption conditions by sending crafted payloads that cause write operations beyond allocated buffer boundaries.  Successful exploitation causes a Denial-of-Service (DoS) condition, causing the device’s process to crash or become unresponsive.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c520ws:2.6:*:*:*:*:*:*:*

History

06 Apr 2026, 20:26

Type Values Removed Values Added
References () https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes - () https://www.tp-link.com/en/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes
References () https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes - () https://www.tp-link.com/us/support/download/tapo-c520ws/#Firmware-Release-Notes - Release Notes
References () https://www.tp-link.com/us/support/faq/5047/ - () https://www.tp-link.com/us/support/faq/5047/ - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
CPE cpe:2.3:o:tp-link:tapo_c520ws_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:tp-link:tapo_c520ws:2.6:*:*:*:*:*:*:*
First Time Tp-link tapo C520ws Firmware
Tp-link
Tp-link tapo C520ws

02 Apr 2026, 18:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-02 18:16

Updated : 2026-04-06 20:26


NVD link : CVE-2026-34118

Mitre link : CVE-2026-34118

CVE.ORG link : CVE-2026-34118


JSON object : View

Products Affected

tp-link

  • tapo_c520ws_firmware
  • tapo_c520ws
CWE
CWE-122

Heap-based Buffer Overflow